Kristian Høgsberg <[email protected]> writes:

> Just so we're clear, what I'm saying above is that this request can be
> trivially exploited by any client to crash the X server with SIGBUS.

I've posted a patch to the list which catches SIGBUS, maps new memory
over the old region, tracks down the offending shared memory segment and
frees the associated resource ID so that the client can figure out what
happened. I decided against closing the client connection down.

-- 
[email protected]

Attachment: pgpmePOLsayCn.pgp
Description: PGP signature

_______________________________________________
[email protected]: X.Org development
Archives: http://lists.x.org/archives/xorg-devel
Info: http://lists.x.org/mailman/listinfo/xorg-devel

Reply via email to