index
:
nx-libs
3.5.0.x
3.6.x
3713346f
feature/nxcomp-bigreq-support
master
nx-X11
nxagent
nxcomp
nxcompext
nxcompshad
nxproxy
pr/DXPC-re-license-retroactively
pr/Xext-cve-fixes
pr/dix-cve-fixes
pr/drop-bin-wrappers
pr/extend_manpage
pr/fix_xkb_crash
pr/gnu-hurd-i386-support
pr/hw-driver-cleanup
pr/libxfont-cleanup
pr/render-cleanup
pr/render-cve-fixes
pr/render-misc-patches
pr/various9
release-builds/3.6.x
update-workflows
upgrade-libX11
NXv3 (redistributed)
about
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
glx: Additional paranoia in __glXGetAnswerBuffer / __GLX_GET_ANSWER_BUFFER (v...
Adam Jackson
2015-02-14
1
-1
/
+2
*
glx: Be more strict about rejecting invalid image sizes [CVE-2014-8093 2/6]
Adam Jackson
2015-02-14
2
-14
/
+14
*
glx: Be more paranoid about variable-length requests [CVE-2014-8093 1/6] (v2)
Adam Jackson
2015-02-14
2
-4
/
+4
*
randr: unvalidated lengths in RandR extension swapped procs [CVE-2014-8101]
Alan Coopersmith
2015-02-14
1
-0
/
+3
*
xfixes: unvalidated length in SProcXFixesSelectSelectionInput [CVE-2014-8102]
Alan Coopersmith
2015-02-14
1
-0
/
+1
*
render: unvalidated lengths in Render extn. swapped procs [CVE-2014-8100 2/2]
Alan Coopersmith
2015-02-14
1
-1
/
+16
*
render: check request size before reading it [CVE-2014-8100 1/2]
Julien Cristau
2015-02-14
1
-1
/
+2
*
Xv: unvalidated lengths in XVideo extension swapped procs [CVE-2014-8099]
Alan Coopersmith
2015-02-14
1
-0
/
+20
*
xcmisc: unvalidated length in SProcXCMiscGetXIDList() [CVE-2014-8096]
Alan Coopersmith
2015-02-14
1
-0
/
+1
*
Xi: unvalidated lengths in Xinput extension [CVE-2014-8095]
Alan Coopersmith
2015-02-14
4
-2
/
+11
*
dbe: unvalidated lengths in DbeSwapBuffers calls [CVE-2014-8097]
Alan Coopersmith
2015-02-14
1
-3
/
+8
*
dix: integer overflow in REQUEST_FIXED_SIZE() [CVE-2014-8092 4/4]
Alan Coopersmith
2015-02-14
1
-1
/
+4
*
dix: integer overflow in RegionSizeof() [CVE-2014-8092 3/4]
Alan Coopersmith
2015-02-14
2
-15
/
+34
*
dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]
Alan Coopersmith
2015-02-14
1
-0
/
+6
*
dix: integer overflow in ProcPutImage() [CVE-2014-8092 1/4]
Alan Coopersmith
2015-02-14
1
-1
/
+3
*
unchecked malloc may allow unauthed client to crash Xserver [CVE-2014-8091]
Alan Coopersmith
2015-02-14
1
-0
/
+4
*
CVE-2014-0210: unvalidated length fields in fs_read_list_info() from xorg/lib...
Mike DePaulo
2015-02-14
1
-1
/
+55
*
CVE-2014-0210: unvalidated length fields in fs_read_list() from xorg/lib/libX...
Mike DePaulo
2015-02-14
1
-0
/
+15
*
CVE-2014-0210: unvalidated length fields in fs_read_glyphs() from xorg/lib/li...
Mike DePaulo
2015-02-14
1
-1
/
+28
*
CVE-2014-0210: unvalidated length fields in fs_read_extent_info() from xorg/l...
Mike DePaulo
2015-02-14
1
-0
/
+10
*
CVE-2014-0211: integer overflow in fs_alloc_glyphs() from xorg/lib/libXfont c...
Mike DePaulo
2015-02-14
1
-1
/
+6
*
CVE-2014-0211: integer overflow in fs_read_extent_info() from xorg/lib/libXfo...
Mike DePaulo
2015-02-14
1
-1
/
+11
*
CVE-2014-0210: unvalidated length fields in fs_read_query_info() from xorg/li...
Mike DePaulo
2015-02-14
2
-7
/
+52
*
CVE-2014-0211: Integer overflow in fs_get_reply/_fs_start_read from xorg/lib/...
Mike DePaulo
2015-02-14
1
-0
/
+18
*
CVE-2014-0210: unvalidated lengths when reading replies from font server from...
Mike DePaulo
2015-02-14
1
-6
/
+38
*
Don't crash when we receive an FS_Error from the font server (Guillem Jover)....
Mike DePaulo
2015-02-14
1
-1
/
+1
*
CVE-2014-0210: unvalidated length in _fs_recv_conn_setup() from xorg/lib/libX...
Mike DePaulo
2015-02-14
1
-3
/
+18
*
CVE-2014-0209: integer overflow of realloc() size in lexAlias() from xorg/lib...
Mike DePaulo
2015-02-14
1
-0
/
+4
*
CVE-2014-0209: integer overflow of realloc() size in FontFileAddEntry() from ...
Mike DePaulo
2015-02-14
1
-0
/
+5
*
CVE-2013-6462: unlimited sscanf overflows stack buffer in bdfReadCharacters()...
Mike DePaulo
2015-02-14
1
-1
/
+1
*
Avoid use-after-free in dix/dixfonts.c: doImageText() [CVE-2013-4396] from xo...
Mike DePaulo
2015-02-14
1
-0
/
+5
*
Fix CVE-2011-4028: File disclosure vulnerability. upstream xorg/xserver commi...
Mike DePaulo
2015-02-14
1
-1
/
+1
*
LZW decompress: fix for CVE-2011-2895 From xorg/lib/Xfont commit d11ee5886e9d...
Mike DePaulo
2015-02-14
1
-0
/
+2
*
Move COPYING.full+lite as COPYING to /
Mike Gabriel
2015-02-14
3
-5
/
+7
*
Move all config files from $(srcbase)/debian/ into $(srcbase)/etc/ folder.
Mike Gabriel
2015-02-14
7
-27
/
+0
*
Provide wrapper scripts for launch NX components in $(src)/bin/.
Mike Gabriel
2015-02-14
25
-31
/
+2
*
Prepare for maintaing upstream changes in upstream ChangeLog.
Mike Gabriel
2015-02-14
4
-24
/
+4
*
VERSION file: master VERSION file is in base folder, symlinked from nx*/VERSI...
Mike Gabriel
2015-02-14
10
-13
/
+7
*
Move Makefile (and auxiliary file replace.sh) into base folder. Adapt packagi...
Mike Gabriel
2015-02-14
5
-11
/
+1
*
Add README.keystrokes file. Fix for commit e91277d02bf1288909daed3b0de8f876f6...
Mike Gabriel
2015-02-14
1
-0
/
+83
*
nxcomp: Add Version.c file. Fix for commit d4d3fe0e6e77a58e68defc5895a589a681...
Mike Gabriel
2015-02-14
1
-0
/
+106
*
Version bump, continuing NX 3.x development.. Targetting NX 3.6.x some time.
Mike Gabriel
2015-02-14
3
-4
/
+11
*
Use proper quoting on build flag vars (they may contain spaces).
Mike Gabriel
2015-02-14
2
-1
/
+2
*
Revert "Fix build when LDFLAGS (etc) contains spaces."
Mike Gabriel
2015-02-14
1
-4
/
+4
*
nx-X11 vs. X.Org 6.9 patches for further studying / documentation
Mike Gabriel
2015-02-13
88
-0
/
+20245
*
Unbrand NX Agent Startup Screen / Brand X2Go Agent Startup Screen (999_nxagen...
Oleksandr Shneyder
2015-02-13
7
-445
/
+158
*
Fix several typos in nxcomp.
Mike Gabriel
2015-02-13
14
-147
/
+12
*
Several fixes for building debug versions of NX (990_fix-DEBUG-and-TEST-build...
Mihai Moldovan
2015-02-13
6
-77
/
+8
*
Detection for Mac OS X's launchd service on Mac OS X 10.10 and beyond (607_nx...
Mike Gabriel
2015-02-13
3
-16
/
+1
*
Provide build support for aarch64 architecture (606_nx-X11_build-on-aarch64.f...
Orion Poplawski
2015-02-13
6
-78
/
+39
[next]