*** This bug is a security vulnerability *** Public security bug reported:
Mesa allows remote attackers to possibly execute arbitrary code due to a samplers array overflow in the glsl/linker. References: http://googlechromereleases.blogspot.com/2012/08/stable-channel-update-for-chrome-os.html http://www.mail-archive.com/mesa-dev@lists.freedesktop.org/msg25207.html Upstream commit: http://cgit.freedesktop.org/mesa/mesa/commit/src/glsl/link_uniforms.cpp?id=ff996cafce511dd8a6c4e066e409c23e147a670c ** Affects: mesa (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu-X, which is subscribed to mesa in Ubuntu. https://bugs.launchpad.net/bugs/1046933 Title: glsl/linker: array buffer overrun [CVE-2012-2864] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1046933/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~ubuntu-x-swat Post to : ubuntu-x-swat@lists.launchpad.net Unsubscribe : https://launchpad.net/~ubuntu-x-swat More help : https://help.launchpad.net/ListHelp