Commit Graph

96 Commits

Author SHA1 Message Date
matthieu
bc4162435d Update to libX11 1.8.10. tested by and ok rsadowski@ 2024-08-04 17:15:57 +00:00
matthieu
6744b1fbb2 Update to libX11 1.8.9 part 6/6: enable threads by default
& build system refresh. Minor library version bump
2024-07-11 07:28:46 +00:00
matthieu
3fa4aa5d35 Update to libX11 1.8.9 part 5: various bug fixes 2024-07-10 08:20:45 +00:00
matthieu
9b8fbacfa4 Update to libX11 1.8.9 part 4: input methods and NLS fixes 2024-07-10 08:13:35 +00:00
matthieu
4975d56e38 Update to libX11 1.8.9 part 3: unifdef legacy systems 2024-07-10 08:04:08 +00:00
matthieu
be3a5206d4 Update to libX11 1.8.9 part 2: Copyright notices updates 2024-07-10 07:35:02 +00:00
matthieu
bdfb14ffc1 Update to libX11 1.8.9 part 1 : documentation updates 2024-07-10 07:13:49 +00:00
bluhm
3f38130026 Fix several input validation errors in libX11 and libXpm.
CVE-2023-43785 CVE-2023-43786 CVE-2023-43787 CVE-2023-43788 CVE-2023-43789
2023-10-03 15:55:58 +00:00
matthieu
dbccd1baf8 Fixes CVE-2023-3138: X servers could return values from XQueryExtension
that would cause Xlib to write entries out-of-bounds of the arrays to
store them, though this would only overwrite other parts of the Display
struct, not outside the bounds allocated for that structure.
2023-06-15 16:24:12 +00:00
matthieu
ff80174089 Document the XIfEvent(3) and friends callbacks are not allowed
to call function that can take the Display lock.
2022-09-03 06:56:57 +00:00
matthieu
adf86f660e Disable the constructor that calls XInitThreads() at load time.
It triggers bugs in some applications. In particular x11/fvwm{2,3}
in ports for which the fix is not straitforward.
Tested by Walter Alejandro Iglesias.
2022-09-03 06:55:25 +00:00
matthieu
e904689319 Update to libX11 1.8.1 2022-07-23 19:28:46 +00:00
matthieu
fa8d4a0f5a Update to libX11 1.7.5. No API / ABI changes. ok tb@ 2022-04-25 19:26:17 +00:00
matthieu
16b669a9d8 Update to libX11 1.7.3.1. ok jsg@ who noticed this requires a major bump. 2022-02-21 08:01:23 +00:00
matthieu
385b79ade0 Upate to libX11 1.7.2 2021-08-30 12:02:40 +00:00
bluhm
82149d4bfb Check strlen(spec) only once at the beginning of XLookupColor().
Also remove a superfluous include.  This synchronises -current with
upstream and the code we shipped in the errata.
OK matthieu@
2021-05-22 16:05:07 +00:00
matthieu
4fb652f1df Reject string longer than USHRT_MAX before sending them on the wire
The X protocol uses CARD16 values to represent the length so
this would overflow.

CVE-2021-31535
2021-05-18 14:15:11 +00:00
matthieu
476ad6aee3 Update to libX11 1.7.0. Tested by gkoehler@ and jsg@ 2020-11-28 14:39:45 +00:00
matthieu
c79b35190f Fix an integer overflow in init_om() that could lead to a double free.
Reported by Jayden Rivers.
2020-08-25 15:39:58 +00:00
matthieu
bb74146ca2 Fix a bug where some input clients can't connect to the input server.
FreeBSD bugzilla reference:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248549
2020-08-20 19:12:48 +00:00
matthieu
4c672aa51a Merge from upstream X.Org : Fix size calculation in _XimAttributeToValue
The check here guards the read below.

For `XimType_XIMStyles`, these are `num` of `CARD32` and for
`XimType_XIMHotKeyTriggers` these are `num` of `XIMTRIGGERKEY` ref[1]
which is defined as 3 x `CARD32`.  (There are data after the
`XIMTRIGGERKEY` according to the spec but they are not read by this
function and doesn't need to be checked.)

The old code here used the native datatype size instead of the wire
protocol size causing the check to always fail.

Also fix the size calculation for the header (size). It is 2 x CARD16
for both types despite the unused `CARD16` for `XimType_XIMStyles`.

This fixes a regression caused by previous commit.
2020-08-06 14:28:54 +00:00
matthieu
f22a219d59 Fixes for Heap corruption in the X input method client in libX11
CVE-2020-14344

These where reported to X.Org and patches proposed by Todd Carson.
Thanks.
2020-07-31 13:53:24 +00:00
matthieu
bc231106f4 Uppdate to libX11 1.6.9. Tested by krw@ and naddy@ 2020-01-04 17:55:16 +00:00
aoyama
8a3654518e Fix gcc3 specific error. The diff is based on latest upstream change.
suggested by jsg@, tested on luna88k by me, ok by jsg@ and matthieu@
2019-09-05 14:03:08 +00:00
matthieu
a400859a9c Update to libX11 1.6.8 riding the major bump caused by xtrans 1.4.0 2019-08-04 13:34:52 +00:00
matthieu
85da565ec0 Update to libxtrans 1.4.0. Major bumps for libX11 and libICE.
no objections from naddy@, espie@ and ajacoutot@
2019-08-04 13:33:46 +00:00
matthieu
7070f339ed Update to libX11 1.6.7 2018-10-20 19:23:25 +00:00
matthieu
b39f51f9a1 Udate to libX11 1.6.6. bug fixes release - no API/ABI changes. 2018-08-23 19:38:11 +00:00
matthieu
c48e946165 This file isn't built anymore. So remove diffs with upstreams. 2017-10-23 17:28:26 +00:00
matthieu
cff04da9bf Update to libX11 1.6.5 2017-02-28 18:44:56 +00:00
matthieu
20a75c6d0f Update to libX11 1.6.4 2016-11-03 10:21:30 +00:00
matthieu
4c3f151ece Remove stale files 2016-11-03 10:19:11 +00:00
matthieu
fd18c20e72 regen 2016-10-11 22:14:30 +00:00
natano
6c14b73344 ks_tables.h is always considered out of date due to the forced rebuild
of the makekeys util. This means it's also rebuilt during install. First
as root during build, later by the BUILDUSER during release, which won't
be able to rewrite it, because it's now owned by root. With this result:

	override rw-r--r--  root/wheel for ks_tables.h?


One step closer towards noperm release builds for xenocara.

ok matthieu
2016-10-08 21:51:47 +00:00
matthieu
89e55bbf5a Validation of server responses in XGetImage()
Check if enough bytes were received for specified image type and
geometry. Otherwise GetPixel and other functions could trigger an
out of boundary read later on.
From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 14:58:26 +00:00
matthieu
bd2560e2ec The validation of server responses avoids out of boundary accesses.
From Tobias Stoeckmann / Xorg Securiry adrvisory Oct 4, 2016.
2016-10-04 14:56:37 +00:00
okan
27f67406f3 Remove support vax and XENOCARA_HAVE_SHARED_LIBS scaffolding.
ok matthieu@
2016-03-11 13:09:42 +00:00
matthieu
8252bb00ee update to libX11 1.6.3 2015-04-06 20:57:55 +00:00
matthieu
936b4cf06e Fix bad merges. 2015-01-01 17:37:52 +00:00
schwarze
01412a19db fix wrong name in .TH, NAME, and SYNOPSIS (obviously bad pastos...)
ok matthieu@
2014-12-09 09:29:52 +00:00
matthieu
8c1effea43 Update to libX11 1.6.2. No API change. 2013-09-28 17:03:13 +00:00
matthieu
ce84febd9d Update to libX11 1.6.1. 2013-08-26 19:57:22 +00:00
matthieu
acee5d3c07 Repair guenther's damage that I didn't ok. 2013-08-13 18:52:10 +00:00
guenther
426afb6384 Bump major on libX11-xcb to match the 64bit time_t change 2013-08-13 08:01:13 +00:00
guenther
b5bb12998e Bump the major on every single base library. There are a couple
not bumped by this that will be corrected soon.

heavy lifting by todd@
2013-08-13 07:07:07 +00:00
matthieu
4b8a5f471a Update to libX11 1.6.0 2013-06-04 03:19:34 +00:00
matthieu
9573aeb427 Update to libX11 1.5.99.902 aka 1.6rc2 2013-05-31 21:17:09 +00:00
matthieu
52f6d0ba20 Merge upstream fixes for several X libs vulnerabilities
discovered by Ilja van Sprundel.

CVE-2013-1981 X.org libX11 1.5.99.901 (1.6 RC1) integer overflows
CVE-2013-1982 X.org libXext 1.3.1 integer overflows
CVE-2013-1983 X.org libXfixes 5.0 integer overflows
CVE-2013-1984 X.org libXi 1.7.1 integer overflows
CVE-2013-1985 X.org libXinerama 1.1.2 integer overflows
CVE-2013-1986 X.org libXrandr 1.4.0 integer overflows
CVE-2013-1987 X.org libXrender 0.9.7 integer overflows
CVE-2013-1988 X.org libXRes 1.0.6 integer overflows
CVE-2013-1989 X.org libXv 1.0.7 integer overflows
CVE-2013-1990 X.org libXvMC 1.0.7 integer overflows
CVE-2013-1991 X.org libXxf86dga 1.1.3 integer overflows
CVE-2013-1992 X.org libdmx 1.1.2 integer overflows
CVE-2013-1994 X.org libchromeXvMC & libchromeXvMCPro in openChrome
0.3.2 integer overflows
CVE-2013-1995 X.org libXi 1.7.1 sign extension issues
CVE-2013-1996 X.org libFS 1.0.4 sign extension issues
CVE-2013-1997 X.org libX11 1.5.99.901 (1.6 RC1) buffer overflows
CVE-2013-1998 X.org libXi 1.7.1 buffer overflows
CVE-2013-1999 X.org libXvMC 1.0.7 buffer overflows
CVE-2013-2000 X.org libXxf86dga 1.1.3 buffer overflows
CVE-2013-2001 X.org libXxf86vm 1.1.2 buffer overflows
CVE-2013-2002 X.org libXt 1.1.3 buffer overflows
CVE-2013-2003 X.org libXcursor 1.1.13 integer overflows
CVE-2013-2004 X.org libX11 1.5.99.901 (1.6 RC1) unbounded recursion
CVE-2013-2005 X.org libXt 1.1.3 memory corruption
CVE-2013-2066 X.org libXv 1.0.7 buffer overflows
2013-05-23 22:42:07 +00:00
matthieu
f2c99c06c2 Update to libX11 1.6RC. No bump needed. 2013-04-28 16:55:55 +00:00
matthieu
be4020d279 Update to libX11 1.5.0 2012-06-11 19:18:54 +00:00