Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 22 Sep 2011 18:26:11 +0200
From: Marcus Meissner <>
To: OSS Security List <>
Subject: CVE Request: Missing input sanitation in various X GLX calls

is a tracker bug for input sanitation lacking in various GLX X calls.

Reporter is

These can probably allow a attacker with access to the GLX calls
(typically just the logged in user) to crash the X server or execute
code within it.

(Not thought about WebGL introduced crash potential here.)

The lacking checks were reported and fixed in git in 2010, so they
probably need a 2010 CVE id. (Single one should be sufficient I guess.)

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ