*** This bug is a security vulnerability ***

Public security bug reported:

Mesa allows remote attackers to possibly execute arbitrary code due to a
samplers array overflow in the glsl/linker.

References: 
  
http://googlechromereleases.blogspot.com/2012/08/stable-channel-update-for-chrome-os.html
  http://www.mail-archive.com/mesa-dev@lists.freedesktop.org/msg25207.html

Upstream commit:
  
http://cgit.freedesktop.org/mesa/mesa/commit/src/glsl/link_uniforms.cpp?id=ff996cafce511dd8a6c4e066e409c23e147a670c

** Affects: mesa (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu-X,
which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/1046933

Title:
  glsl/linker: array buffer overrun [CVE-2012-2864]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1046933/+subscriptions

_______________________________________________
Mailing list: https://launchpad.net/~ubuntu-x-swat
Post to     : ubuntu-x-swat@lists.launchpad.net
Unsubscribe : https://launchpad.net/~ubuntu-x-swat
More help   : https://help.launchpad.net/ListHelp

Reply via email to