| Commit message (Expand) | Author | Age | Files | Lines |
... | |
* | glx: Length checking for non-generated single requests (v2) [CVE-2014-8098 7/8] | Adam Jackson | 2015-02-14 | 4 | -20/+52 |
* | glx: Top-level length checking for swapped VendorPrivate requests [CVE-2014-8... | Adam Jackson | 2015-02-14 | 1 | -0/+4 |
* | glx: Integer overflow protection for non-generated render requests (v3) [CVE-... | Adam Jackson | 2015-02-14 | 1 | -31/+37 |
* | glx: Length checking for GLXRender requests (v2) [CVE-2014-8098 2/8] (v3) | Julien Cristau | 2015-02-14 | 2 | -20/+20 |
* | glx: Add safe_{add,mul,pad} (v3) [CVE-2014-8093 4/6] (v4) | Adam Jackson | 2015-02-14 | 1 | -0/+41 |
* | glx: Additional paranoia in __glXGetAnswerBuffer / __GLX_GET_ANSWER_BUFFER (v... | Adam Jackson | 2015-02-14 | 1 | -1/+2 |
* | glx: Be more strict about rejecting invalid image sizes [CVE-2014-8093 2/6] | Adam Jackson | 2015-02-14 | 2 | -14/+14 |
* | glx: Be more paranoid about variable-length requests [CVE-2014-8093 1/6] (v2) | Adam Jackson | 2015-02-14 | 2 | -4/+4 |
* | randr: unvalidated lengths in RandR extension swapped procs [CVE-2014-8101] | Alan Coopersmith | 2015-02-14 | 1 | -0/+3 |
* | xfixes: unvalidated length in SProcXFixesSelectSelectionInput [CVE-2014-8102] | Alan Coopersmith | 2015-02-14 | 1 | -0/+1 |
* | render: unvalidated lengths in Render extn. swapped procs [CVE-2014-8100 2/2] | Alan Coopersmith | 2015-02-14 | 1 | -1/+16 |
* | render: check request size before reading it [CVE-2014-8100 1/2] | Julien Cristau | 2015-02-14 | 1 | -1/+2 |
* | Xv: unvalidated lengths in XVideo extension swapped procs [CVE-2014-8099] | Alan Coopersmith | 2015-02-14 | 1 | -0/+20 |
* | xcmisc: unvalidated length in SProcXCMiscGetXIDList() [CVE-2014-8096] | Alan Coopersmith | 2015-02-14 | 1 | -0/+1 |
* | Xi: unvalidated lengths in Xinput extension [CVE-2014-8095] | Alan Coopersmith | 2015-02-14 | 4 | -2/+11 |
* | dbe: unvalidated lengths in DbeSwapBuffers calls [CVE-2014-8097] | Alan Coopersmith | 2015-02-14 | 1 | -3/+8 |
* | dix: integer overflow in REQUEST_FIXED_SIZE() [CVE-2014-8092 4/4] | Alan Coopersmith | 2015-02-14 | 1 | -1/+4 |
* | dix: integer overflow in RegionSizeof() [CVE-2014-8092 3/4] | Alan Coopersmith | 2015-02-14 | 2 | -15/+34 |
* | dix: integer overflow in GetHosts() [CVE-2014-8092 2/4] | Alan Coopersmith | 2015-02-14 | 1 | -0/+6 |
* | dix: integer overflow in ProcPutImage() [CVE-2014-8092 1/4] | Alan Coopersmith | 2015-02-14 | 1 | -1/+3 |
* | unchecked malloc may allow unauthed client to crash Xserver [CVE-2014-8091] | Alan Coopersmith | 2015-02-14 | 1 | -0/+4 |
* | CVE-2014-0210: unvalidated length fields in fs_read_list_info() from xorg/lib... | Mike DePaulo | 2015-02-14 | 1 | -1/+55 |
* | CVE-2014-0210: unvalidated length fields in fs_read_list() from xorg/lib/libX... | Mike DePaulo | 2015-02-14 | 1 | -0/+15 |
* | CVE-2014-0210: unvalidated length fields in fs_read_glyphs() from xorg/lib/li... | Mike DePaulo | 2015-02-14 | 1 | -1/+28 |
* | CVE-2014-0210: unvalidated length fields in fs_read_extent_info() from xorg/l... | Mike DePaulo | 2015-02-14 | 1 | -0/+10 |
* | CVE-2014-0211: integer overflow in fs_alloc_glyphs() from xorg/lib/libXfont c... | Mike DePaulo | 2015-02-14 | 1 | -1/+6 |
* | CVE-2014-0211: integer overflow in fs_read_extent_info() from xorg/lib/libXfo... | Mike DePaulo | 2015-02-14 | 1 | -1/+11 |
* | CVE-2014-0210: unvalidated length fields in fs_read_query_info() from xorg/li... | Mike DePaulo | 2015-02-14 | 2 | -7/+52 |
* | CVE-2014-0211: Integer overflow in fs_get_reply/_fs_start_read from xorg/lib/... | Mike DePaulo | 2015-02-14 | 1 | -0/+18 |
* | CVE-2014-0210: unvalidated lengths when reading replies from font server from... | Mike DePaulo | 2015-02-14 | 1 | -6/+38 |
* | Don't crash when we receive an FS_Error from the font server (Guillem Jover).... | Mike DePaulo | 2015-02-14 | 1 | -1/+1 |
* | CVE-2014-0210: unvalidated length in _fs_recv_conn_setup() from xorg/lib/libX... | Mike DePaulo | 2015-02-14 | 1 | -3/+18 |
* | CVE-2014-0209: integer overflow of realloc() size in lexAlias() from xorg/lib... | Mike DePaulo | 2015-02-14 | 1 | -0/+4 |
* | CVE-2014-0209: integer overflow of realloc() size in FontFileAddEntry() from ... | Mike DePaulo | 2015-02-14 | 1 | -0/+5 |
* | CVE-2013-6462: unlimited sscanf overflows stack buffer in bdfReadCharacters()... | Mike DePaulo | 2015-02-14 | 1 | -1/+1 |
* | Avoid use-after-free in dix/dixfonts.c: doImageText() [CVE-2013-4396] from xo... | Mike DePaulo | 2015-02-14 | 1 | -0/+5 |
* | Fix CVE-2011-4028: File disclosure vulnerability. upstream xorg/xserver commi... | Mike DePaulo | 2015-02-14 | 1 | -1/+1 |
* | LZW decompress: fix for CVE-2011-2895 From xorg/lib/Xfont commit d11ee5886e9d... | Mike DePaulo | 2015-02-14 | 1 | -0/+2 |
* | Move COPYING.full+lite as COPYING to / | Mike Gabriel | 2015-02-14 | 3 | -5/+7 |
* | Move all config files from $(srcbase)/debian/ into $(srcbase)/etc/ folder. | Mike Gabriel | 2015-02-14 | 7 | -27/+0 |
* | Provide wrapper scripts for launch NX components in $(src)/bin/. | Mike Gabriel | 2015-02-14 | 25 | -31/+2 |
* | Prepare for maintaing upstream changes in upstream ChangeLog. | Mike Gabriel | 2015-02-14 | 4 | -24/+4 |
* | VERSION file: master VERSION file is in base folder, symlinked from nx*/VERSI... | Mike Gabriel | 2015-02-14 | 10 | -13/+7 |
* | Move Makefile (and auxiliary file replace.sh) into base folder. Adapt packagi... | Mike Gabriel | 2015-02-14 | 5 | -11/+1 |
* | Add README.keystrokes file. Fix for commit e91277d02bf1288909daed3b0de8f876f6... | Mike Gabriel | 2015-02-14 | 1 | -0/+83 |
* | nxcomp: Add Version.c file. Fix for commit d4d3fe0e6e77a58e68defc5895a589a681... | Mike Gabriel | 2015-02-14 | 1 | -0/+106 |
* | Version bump, continuing NX 3.x development.. Targetting NX 3.6.x some time. | Mike Gabriel | 2015-02-14 | 3 | -4/+11 |
* | Use proper quoting on build flag vars (they may contain spaces). | Mike Gabriel | 2015-02-14 | 2 | -1/+2 |
* | Revert "Fix build when LDFLAGS (etc) contains spaces." | Mike Gabriel | 2015-02-14 | 1 | -4/+4 |
* | nx-X11 vs. X.Org 6.9 patches for further studying / documentation | Mike Gabriel | 2015-02-13 | 88 | -0/+20245 |