[Openchrome-devel] [xf86-video-openchrome]X driver for VIA IGPs branch master updated. release_0_3_2-14-g0c17f81

Xavier Bachelot xavierb at kemper.freedesktop.org
Thu May 23 08:09:31 PDT 2013


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "X driver for VIA IGPs".

The branch, master has been updated
       via  0c17f81ad43d42958ab3871c9b5c5e9cea402256 (commit)
       via  db309e3cd87a1279e8b592a692390755c528de4f (commit)
       via  68bf50ce4903ec93da59cea78e063ed7c3882d3e (commit)
       via  50cef9490c6a128613c5b9f3f19ef2e803088983 (commit)
      from  79731f58281eb8782f8291a3d9375cb3f7691a13 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 0c17f81ad43d42958ab3871c9b5c5e9cea402256
Author: Xavier Bachelot <xavier at bachelot.org>
Date:   Wed May 22 18:58:48 2013 +0200

    Bump version to 0.3.3

commit db309e3cd87a1279e8b592a692390755c528de4f
Author: Alan Coopersmith <alan.coopersmith at oracle.com>
Date:   Sat Apr 13 20:57:07 2013 -0700

    integer overflow in uniDRIGetClientDriverName() in libchromeXvMC* [CVE-2013-1994 2/2]
    
    clientDriverNameLength is a CARD32 and needs to be bounds checked before
    adding one to it to come up with the total size to allocate, to avoid
    integer overflow leading to underallocation and writing data from the
    network past the end of the allocated buffer.
    
    Reported-by: Ilja Van Sprundel <ivansprundel at ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith at oracle.com>

commit 68bf50ce4903ec93da59cea78e063ed7c3882d3e
Author: Alan Coopersmith <alan.coopersmith at oracle.com>
Date:   Sat Apr 13 20:49:43 2013 -0700

    integer overflow in uniDRIOpenConnection() in libchromeXvMC* [CVE-2013-1994 1/2]
    
    busIdStringLength is a CARD32 and needs to be bounds checked before adding
    one to it to come up with the total size to allocate, to avoid integer
    overflow leading to underallocation and writing data from the network past
    the end of the allocated buffer.
    
    Reported-by: Ilja Van Sprundel <ivansprundel at ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith at oracle.com>

commit 50cef9490c6a128613c5b9f3f19ef2e803088983
Author: Xavier Bachelot <xavier at bachelot.org>
Date:   Tue May 21 21:24:41 2013 +0200

    Probe TV encoder on all but the P4M900, unless we know the board has a TV encoder.
    
    Probing the TV encoder on the P4M900 chipset family when there is no such encoder is not safe. It is safe however on all other platforms.

-----------------------------------------------------------------------

Summary of changes:
 NEWS               |    8 ++++++++
 configure.ac       |    2 +-
 src/via_outputs.c  |    2 +-
 src/xvmc/xf86dri.c |   14 +++++++++++---
 4 files changed, 21 insertions(+), 5 deletions(-)


hooks/post-receive
-- 
X driver for VIA IGPs


More information about the Openchrome-devel mailing list