| Commit message (Expand) | Author | Age | Files | Lines |
... | |
* | xkb: Check strings length against request size | Olivier Fourdan | 2015-02-17 | 1 | -25/+41 |
* | xkb: Don't swap XkbSetGeometry data in the input buffer | Olivier Fourdan | 2015-02-17 | 1 | -16/+19 |
* | include: introduce byte counting functions. | Peter Hutterer | 2015-02-17 | 1 | -0/+30 |
* | Coverity #844, #845, #846: Fix memory leaks. | Daniel Stone | 2015-02-17 | 1 | -3/+19 |
* | Merge pull request #3 from sunweaver/feature/nxagent-version-v2 | Mike Gabriel | 2015-02-17 | 8 | -6/+93 |
|\ |
|
| * | Make nxagent process aware of its current NX'ish version. | Mike Gabriel | 2015-02-17 | 7 | -5/+93 |
| * | nx-X11/programs/Xserver/hw/nxagent/: Drop unused VERSION file. | Mike Gabriel | 2015-02-16 | 1 | -1/+0 |
|/ |
|
* | Do proper input validation to fix for CVE-2011-2895. | Joerg Sonnenberger | 2015-02-16 | 1 | -14/+17 |
* | Revert "Do proper input validation to fix for CVE-2011-2895." | Mike Gabriel | 2015-02-16 | 1 | -17/+14 |
* | fix 3.5.0.29 changelog entry | Mike Gabriel | 2015-02-16 | 1 | -12/+12 |
* | debian/changelog: fix too-long lines | Mike Gabriel | 2015-02-16 | 1 | -6/+6 |
* | Makefile.nx-libs: Fix uninstall-lite rule. The nxproxy and nxcomp uninstallat... | Mike Gabriel | 2015-02-16 | 2 | -5/+11 |
* | Make install-lite rule in Makefile.nx-libs more predictable and not rely on n... | Mike Gabriel | 2015-02-16 | 2 | -5/+12 |
* | Install "%{_libdir}/nx/bin" into nxproxy package. | Mike Gabriel | 2015-02-16 | 2 | -0/+3 |
* | nx-libs.spec: Typo fix in comment. | Mike Gabriel | 2015-02-16 | 1 | -1/+1 |
* | Fix FTBFS due to the nxproxy executable already existing under /usr/lib/nx/bi... | Mike DePaulo | 2015-02-16 | 2 | -4/+67 |
* | Do proper input validation to fix for CVE-2011-2895. | Joerg Sonnenberger | 2015-02-16 | 1 | -14/+17 |
* | nx-X11/lib/font/fc/fserve.c: initialize remaining bufleft variables. | Mihai Moldovan | 2015-02-16 | 1 | -2/+2 |
* | dix: integer overflow in GetHosts() [CVE-2014-8092 2/4] | Alan Coopersmith | 2015-02-16 | 1 | -0/+6 |
* | Revert "dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]" | Mihai Moldovan | 2015-02-16 | 1 | -6/+0 |
* | CVE-2014-0210: unvalidated length in _fs_recv_conn_setup() from xorg/lib/libX... | Mike DePaulo | 2015-02-16 | 1 | -3/+18 |
* | Revert "CVE-2014-0210: unvalidated length in _fs_recv_conn_setup() from xorg/... | Mihai Moldovan | 2015-02-16 | 1 | -18/+3 |
* | CVE-2014-0210: unvalidated length fields in fs_read_query_info() from xorg/li... | Mike DePaulo | 2015-02-16 | 2 | -8/+54 |
* | Revert "CVE-2014-0210: unvalidated length fields in fs_read_query_info() from... | Mihai Moldovan | 2015-02-16 | 2 | -52/+7 |
* | glx: Pass remaining request length into ->varsize (v2) [CVE-2014-8098 8/8] (V3) | Adam Jackson | 2015-02-14 | 4 | -107/+121 |
* | glx: Length checking for RenderLarge requests (v2) [CVE-2014-8098 3/8] (v3) | Adam Jackson | 2015-02-14 | 2 | -46/+71 |
* | glx: Length checking for non-generated single requests (v2) [CVE-2014-8098 7/8] | Adam Jackson | 2015-02-14 | 4 | -20/+52 |
* | glx: Top-level length checking for swapped VendorPrivate requests [CVE-2014-8... | Adam Jackson | 2015-02-14 | 1 | -0/+4 |
* | glx: Integer overflow protection for non-generated render requests (v3) [CVE-... | Adam Jackson | 2015-02-14 | 1 | -31/+37 |
* | glx: Length checking for GLXRender requests (v2) [CVE-2014-8098 2/8] (v3) | Julien Cristau | 2015-02-14 | 2 | -20/+20 |
* | glx: Add safe_{add,mul,pad} (v3) [CVE-2014-8093 4/6] (v4) | Adam Jackson | 2015-02-14 | 1 | -0/+41 |
* | glx: Additional paranoia in __glXGetAnswerBuffer / __GLX_GET_ANSWER_BUFFER (v... | Adam Jackson | 2015-02-14 | 1 | -1/+2 |
* | glx: Be more strict about rejecting invalid image sizes [CVE-2014-8093 2/6] | Adam Jackson | 2015-02-14 | 2 | -14/+14 |
* | glx: Be more paranoid about variable-length requests [CVE-2014-8093 1/6] (v2) | Adam Jackson | 2015-02-14 | 2 | -4/+4 |
* | randr: unvalidated lengths in RandR extension swapped procs [CVE-2014-8101] | Alan Coopersmith | 2015-02-14 | 1 | -0/+3 |
* | xfixes: unvalidated length in SProcXFixesSelectSelectionInput [CVE-2014-8102] | Alan Coopersmith | 2015-02-14 | 1 | -0/+1 |
* | render: unvalidated lengths in Render extn. swapped procs [CVE-2014-8100 2/2] | Alan Coopersmith | 2015-02-14 | 1 | -1/+16 |
* | render: check request size before reading it [CVE-2014-8100 1/2] | Julien Cristau | 2015-02-14 | 1 | -1/+2 |
* | Xv: unvalidated lengths in XVideo extension swapped procs [CVE-2014-8099] | Alan Coopersmith | 2015-02-14 | 1 | -0/+20 |
* | xcmisc: unvalidated length in SProcXCMiscGetXIDList() [CVE-2014-8096] | Alan Coopersmith | 2015-02-14 | 1 | -0/+1 |
* | Xi: unvalidated lengths in Xinput extension [CVE-2014-8095] | Alan Coopersmith | 2015-02-14 | 4 | -2/+11 |
* | dbe: unvalidated lengths in DbeSwapBuffers calls [CVE-2014-8097] | Alan Coopersmith | 2015-02-14 | 1 | -3/+8 |
* | dix: integer overflow in REQUEST_FIXED_SIZE() [CVE-2014-8092 4/4] | Alan Coopersmith | 2015-02-14 | 1 | -1/+4 |
* | dix: integer overflow in RegionSizeof() [CVE-2014-8092 3/4] | Alan Coopersmith | 2015-02-14 | 2 | -15/+34 |
* | dix: integer overflow in GetHosts() [CVE-2014-8092 2/4] | Alan Coopersmith | 2015-02-14 | 1 | -0/+6 |
* | dix: integer overflow in ProcPutImage() [CVE-2014-8092 1/4] | Alan Coopersmith | 2015-02-14 | 1 | -1/+3 |
* | unchecked malloc may allow unauthed client to crash Xserver [CVE-2014-8091] | Alan Coopersmith | 2015-02-14 | 1 | -0/+4 |
* | CVE-2014-0210: unvalidated length fields in fs_read_list_info() from xorg/lib... | Mike DePaulo | 2015-02-14 | 1 | -1/+55 |
* | CVE-2014-0210: unvalidated length fields in fs_read_list() from xorg/lib/libX... | Mike DePaulo | 2015-02-14 | 1 | -0/+15 |
* | CVE-2014-0210: unvalidated length fields in fs_read_glyphs() from xorg/lib/li... | Mike DePaulo | 2015-02-14 | 1 | -1/+28 |