aboutsummaryrefslogtreecommitdiff
path: root/nx-X11/programs/Xserver
Commit message (Expand)AuthorAgeFilesLines
...
* imake cleanup: Drop all references to XdmxServer and BuildXdmx*.Mike Gabriel2015-04-044-1209/+1
* imake cleanup: Drop all references to XVirtualFramebufferServer.Mike Gabriel2015-04-042-45/+3
* imake cleanup: Drop all references to XNestServer.Mike Gabriel2015-04-042-45/+3
* imake cleanup: Drop all references to XWinServer.Mike Gabriel2015-04-041-97/+2
* nx-X11: add more NULL guards to TEST and DEBUG sections of Render.c.Mihai Moldovan2015-03-291-65/+90
* nx-X11: fix typo in previous commit.Mihai Moldovan2015-03-291-1/+1
* nx-X11: handle source pictures (those without a Drawable surface) gracefully.Mihai Moldovan2015-03-294-20/+89
* nx-X11/**: Drop non-imake Makefile* files.Mike Gabriel2015-03-042-726/+0
* library clean-up: Don't build libNX_Xpm anymore. Use system's libXpm shared l...Mike Gabriel2015-03-032-2/+2
* xkb: Check strings length against request sizeOlivier Fourdan2015-02-171-25/+41
* xkb: Don't swap XkbSetGeometry data in the input bufferOlivier Fourdan2015-02-171-16/+19
* include: introduce byte counting functions.Peter Hutterer2015-02-171-0/+30
* Coverity #844, #845, #846: Fix memory leaks.Daniel Stone2015-02-171-3/+19
* Make nxagent process aware of its current NX'ish version.Mike Gabriel2015-02-172-3/+9
* nx-X11/programs/Xserver/hw/nxagent/: Drop unused VERSION file.Mike Gabriel2015-02-161-1/+0
* dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]Alan Coopersmith2015-02-161-0/+6
* Revert "dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]"Mihai Moldovan2015-02-161-6/+0
* glx: Pass remaining request length into ->varsize (v2) [CVE-2014-8098 8/8] (V3)Adam Jackson2015-02-144-107/+121
* glx: Length checking for RenderLarge requests (v2) [CVE-2014-8098 3/8] (v3)Adam Jackson2015-02-142-46/+71
* glx: Length checking for non-generated single requests (v2) [CVE-2014-8098 7/8]Adam Jackson2015-02-144-20/+52
* glx: Top-level length checking for swapped VendorPrivate requests [CVE-2014-8...Adam Jackson2015-02-141-0/+4
* glx: Integer overflow protection for non-generated render requests (v3) [CVE-...Adam Jackson2015-02-141-31/+37
* glx: Length checking for GLXRender requests (v2) [CVE-2014-8098 2/8] (v3)Julien Cristau2015-02-142-20/+20
* glx: Add safe_{add,mul,pad} (v3) [CVE-2014-8093 4/6] (v4)Adam Jackson2015-02-141-0/+41
* glx: Additional paranoia in __glXGetAnswerBuffer / __GLX_GET_ANSWER_BUFFER (v...Adam Jackson2015-02-141-1/+2
* glx: Be more strict about rejecting invalid image sizes [CVE-2014-8093 2/6]Adam Jackson2015-02-142-14/+14
* glx: Be more paranoid about variable-length requests [CVE-2014-8093 1/6] (v2)Adam Jackson2015-02-142-4/+4
* randr: unvalidated lengths in RandR extension swapped procs [CVE-2014-8101]Alan Coopersmith2015-02-141-0/+3
* xfixes: unvalidated length in SProcXFixesSelectSelectionInput [CVE-2014-8102]Alan Coopersmith2015-02-141-0/+1
* render: unvalidated lengths in Render extn. swapped procs [CVE-2014-8100 2/2]Alan Coopersmith2015-02-141-1/+16
* render: check request size before reading it [CVE-2014-8100 1/2]Julien Cristau2015-02-141-1/+2
* Xv: unvalidated lengths in XVideo extension swapped procs [CVE-2014-8099]Alan Coopersmith2015-02-141-0/+20
* xcmisc: unvalidated length in SProcXCMiscGetXIDList() [CVE-2014-8096]Alan Coopersmith2015-02-141-0/+1
* Xi: unvalidated lengths in Xinput extension [CVE-2014-8095]Alan Coopersmith2015-02-144-2/+11
* dbe: unvalidated lengths in DbeSwapBuffers calls [CVE-2014-8097]Alan Coopersmith2015-02-141-3/+8
* dix: integer overflow in REQUEST_FIXED_SIZE() [CVE-2014-8092 4/4]Alan Coopersmith2015-02-141-1/+4
* dix: integer overflow in RegionSizeof() [CVE-2014-8092 3/4]Alan Coopersmith2015-02-142-15/+34
* dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]Alan Coopersmith2015-02-141-0/+6
* dix: integer overflow in ProcPutImage() [CVE-2014-8092 1/4]Alan Coopersmith2015-02-141-1/+3
* unchecked malloc may allow unauthed client to crash Xserver [CVE-2014-8091]Alan Coopersmith2015-02-141-0/+4
* Avoid use-after-free in dix/dixfonts.c: doImageText() [CVE-2013-4396] from xo...Mike DePaulo2015-02-141-0/+5
* Fix CVE-2011-4028: File disclosure vulnerability. upstream xorg/xserver commi...Mike DePaulo2015-02-141-1/+1
* VERSION file: master VERSION file is in base folder, symlinked from nx*/VERSI...Mike Gabriel2015-02-141-0/+1
* Unbrand NX Agent Startup Screen / Brand X2Go Agent Startup Screen (999_nxagen...Oleksandr Shneyder2015-02-135-77/+158
* Several fixes for building debug versions of NX (990_fix-DEBUG-and-TEST-build...Mihai Moldovan2015-02-134-7/+8
* Provide build support for aarch64 architecture (606_nx-X11_build-on-aarch64.f...Orion Poplawski2015-02-131-0/+22
* Handle some serious compilation warnings (603_nx-X11_compilation_warnings.ful...Mirraz Mirraz2015-02-131-0/+6
* Be compliant with POS36-C: Observe correct revocation order while relinquishi...Orion Poplawski2015-02-131-0/+7
* Unique Library Names Patch (600_nx-X11+nxcompext+nxcompshad_unique-libnames.f...Jan Engelhardt2015-02-131-9/+9
* Adapt paths of keystrokes.cfg if nxagent runs as x2goagent (321_nxagent_x2go-...Horst Schirmeier2015-02-131-0/+6