Kristian Høgsberg <[email protected]> writes: > Just so we're clear, what I'm saying above is that this request can be > trivially exploited by any client to crash the X server with SIGBUS.
I've posted a patch to the list which catches SIGBUS, maps new memory over the old region, tracks down the offending shared memory segment and frees the associated resource ID so that the client can figure out what happened. I decided against closing the client connection down. -- [email protected]
pgpmePOLsayCn.pgp
Description: PGP signature
_______________________________________________ [email protected]: X.Org development Archives: http://lists.x.org/archives/xorg-devel Info: http://lists.x.org/mailman/listinfo/xorg-devel
