Commit Graph

2252 Commits

Author SHA1 Message Date
matthieu
36280ef589 Update twm to version 1.0.12 2022-08-31 09:20:15 +00:00
matthieu
197e19f087 The update to twm 1.0.11 missed upgrading configure.ac.
update and regen autotools files
2022-08-31 08:48:22 +00:00
matthieu
f32f27cd2a Update oclock to version 1.0.5 2022-08-31 08:35:51 +00:00
matthieu
306257260c Update ico to version 1.0.6 2022-08-31 08:30:15 +00:00
gnezdo
65d0a6644c Properly support style in passwd\nOK matthieu 2022-08-29 18:11:41 +00:00
matthieu
6c19a92e2b kill extra space at EOL 2022-08-07 08:06:54 +00:00
matthieu
f9739d85ea fix indentation style and space/tab 2022-08-07 08:04:41 +00:00
matthieu
10a4b7d422 If unveil(2) fails, display an error with the failing path.
Discussed with deraadt@ ok millert@
2022-08-07 07:10:54 +00:00
matthieu
4f74838129 Set default sleep value to 10ms. This makes ico look nice again. 2022-07-17 08:47:02 +00:00
matthieu
dc14df46d8 Update xrefresh to version 1.0.7 2022-07-15 13:05:14 +00:00
matthieu
b5b32509c7 Update xmessage to version 1.0.6 2022-07-15 12:59:15 +00:00
matthieu
147368cf2b Update xmag to version 1.0.7 2022-07-15 12:54:23 +00:00
matthieu
f9698c892e Update xkbutils to version 1.0.5 2022-07-15 12:49:03 +00:00
matthieu
d52fcaab18 Update xev to version 1.2.5 2022-07-15 12:42:48 +00:00
matthieu
3fedd5395e Update to xwud version 1.0.6 2022-07-15 10:31:35 +00:00
matthieu
c17f728a49 Update xpr to version 1.1.0
Removes support for old DEC printers
2022-07-15 10:24:18 +00:00
matthieu
d14607210c Update xmodpap to version 1.0.11 2022-07-15 10:17:20 +00:00
matthieu
1d3ce46609 Update xfontsel to vesion 1.1.0 2022-07-15 10:10:12 +00:00
matthieu
4148ea6407 Update xconsole to version 1.0.8 2022-07-15 09:54:07 +00:00
matthieu
3869dc9794 Update xcmsdb to version 1.0.6 2022-07-15 09:37:01 +00:00
matthieu
99f5abb2dc Update xclipboard to version 1.1.4 2022-07-15 09:32:07 +00:00
semarie
9417938ea8 xlock: unveil(2) all login.conf files for reading
auth_userokay(3) needs to be able to read these files to properly respect
configuration.

ok tb@ matthieu@
2022-07-07 05:00:19 +00:00
naddy
5fcec91123 X11 session startup: update list of ssh key files, tweak sh code
ok matthieu@
2022-07-01 20:42:06 +00:00
matthieu
6abf343886 Implement privilege separation in xlock(1).
With feedback from stsp@, florian@, op@ ok florian@ op@.
2022-06-26 14:09:51 +00:00
matthieu
649fd50c90 Update xsm to version 1.0.5
Bug fixes and gcc warnings removals.
2022-06-26 10:47:16 +00:00
matthieu
9640aa6200 Update xlsfonts to version 1.0.7
Bug fixes + gcc warnings removal
2022-06-26 10:39:25 +00:00
matthieu
ca1de52995 Update xload to version 1.1.4
No functional change.
2022-06-26 10:34:21 +00:00
matthieu
a29889d727 Update xedit to version 1.2.3
Bug fixes
2022-06-26 10:25:50 +00:00
matthieu
ee462b9077 update xdpyinfo to version 1.3.3
Bug fixes. Among other correctly report recent X server versions.
2022-06-26 08:37:41 +00:00
matthieu
7d1686e90e Get rid of remaining compiler warnings on OpenBSD 2022-06-25 21:12:41 +00:00
matthieu
71430a97b5 Update xclock to version 1.1.1
Bug fixes + smooth hands update in render mode
2022-06-25 21:09:16 +00:00
matthieu
6805087407 Update xcalc to version 1.1.1
No functional changes.
2022-06-25 20:00:33 +00:00
matthieu
62bcd22490 source files do not have the 'x' bit set. Use /bin/sh explicitely 2022-06-25 19:38:15 +00:00
matthieu
b7f211187b add file missed by CVS or me in update to xauth 1.1.2 2022-06-25 19:37:02 +00:00
matthieu
31feb85522 Update xauth to version 1.1.2
Bug fixes.
2022-06-25 17:26:35 +00:00
matthieu
5bb88d581f Update setxkbmap to version 1.3.3
Bug fixes.
2022-06-25 17:16:49 +00:00
matthieu
dcc42f414d Update mkfontscale to version 1.2.2
Accept ExtraBold for T1 fonts.
2022-06-25 17:11:49 +00:00
matthieu
8cadb81c82 Update listres to version 1.0.5
No functional changes.
2022-06-25 17:07:21 +00:00
matthieu
108e08f957 Update iceauth to version 1.0.9
Bug fixes.
2022-06-25 17:05:31 +00:00
matthieu
b5c464895c Update editres to version 1.0.8.
No functional changes.
2022-06-25 17:00:42 +00:00
matthieu
7049d86818 Update bitmap to version 1.1.0
Bug fixes + code reorganisation
2022-06-25 16:22:23 +00:00
matthieu
0823eb8ef4 Update appres to version 1.0.6.
No functional changes
2022-06-25 16:10:46 +00:00
deraadt
8b7214bf5f allowMouseOps default is disabled. adjust documentation. 2022-06-04 23:44:52 +00:00
matthieu
aaec4ee837 Document removal of exec-formatted(), exec-selectable() and
spawn-new-terminal() functions.
2022-05-22 15:22:41 +00:00
deraadt
25dfd5d4c8 Back in darker times, xterm was setuid root to add a user entry to the
utmp and wtmp files at startup. real-uid / effective-uid flipping was
used to cleanup the records in these two files at logout-time.  Over
time it was recognized that setuid root is too dangerous, later on
even uid flipping became an unacceptable practice (because an attacker
who finds a bug will simply flip the uid back to root before
continuing exploitation).  Some OS's helped xterm (and other similar
login-related tooling) by making utmp writeable by a new utmp group,
but most did not do the same for wtmp.  xterm started using this new
utmp gid, and the wtmp code moved to "try, and if it fails, ignore the
failure".

The obvious way to use this uid is for xterm to open the utmp file for
write (early on), discard the egid, and keep the file descriptor
around until utmp cleanup at termination.  10-20 lines of code, maybe.
But no,.... that's not what happened.

The previous setuid root flipping code (which is nearly a hundred
lines of #ifdef-wrapped code for portability reasons) was copied and
repurposed by adding new #ifdef code for setgid utmp flipping, and
thus nearly a hundred lines of #ifdef-wrapped code was added).  setgid
flipping has less severe security risks than setuid flipping, but it
is remains an excessively strong and unneccessary power (compared to a
single writeable fd).

When pledge() arrived on the scene, "wpath" was required so that the
utmp file could be opened late, and "id" was required to support egid
flipping.  unveil() arrived on the scene, and the utmp path was added
to the list of viable paths, once again not considering that an incorrect
approach was being taken by the code.

I tried rewriting the portable USE_UTMP_SETGID code to follow the
open-drop-reuse-fd approach, to help out upstream xterm, but it is such
a brain-melting shitshow I gave up, we'll have a (small) intrusive patch
which opens utmp early, drops the gid, and reuses the fd later on.

Maybe upstream will take care of this eventually to reduce the risk of
egid other operating systems.
ok matthieu, much feedback from millert
2022-05-22 14:43:01 +00:00
deraadt
064fa8f9ad Disable wtmp support on OpenBSD, it hasn't worked in nearly two decades
because we dropped setuid root around the, but the code to attempt it
it was erroneously left behind
ok matthieu
2022-05-22 14:07:51 +00:00
deraadt
142eb119d9 Disable the exec-formatted and exec-selectable strictly
ok matthieu
2022-05-22 14:03:01 +00:00
deraadt
aa49914ccf Avoid snprintf truncation near environment variables
ok matthieu
2022-05-22 13:56:30 +00:00
deraadt
e5be32f8f5 A few support functions can be hidden using OPT_EXEC_XTERM, because
the top-level features are disabled because our xterm uses pledge
without "exec" support.
ok matthieu
2022-05-22 13:50:19 +00:00
matthieu
77c0be362c Update to xterm 372. ok tb@, naddy@. Tested by others too. 2022-04-25 19:20:37 +00:00