1. 23 Jun, 2015 1 commit
  2. 22 Jun, 2015 1 commit
  3. 21 Jun, 2015 1 commit
  4. 20 Jun, 2015 1 commit
  5. 16 Jun, 2015 1 commit
    • Mike Gabriel's avatar
      Drop nx-X11/lib/GL and move Imakefile.inc include files into Xserver code tree. · cb4a2d73
      Mike Gabriel authored
       The client-side library libNX_GL.{a,so} is not built when building nx-libs.
      
       However, nx-X11/lib/GL/** ships several imake include files
       (Imakefile.inc) that are also used in nx-X11/programs/Xserver/GL/**.
       These files have been moved from the nx-X11/lib/GL/ code subtree to the
       nx-X11/programs/Xserver/GL/.
      
       Furthermore, we don't provide module builds of the GL extension anymore,
       as that feature is neither used in nx-libs.
      cb4a2d73
  6. 02 Jun, 2015 1 commit
  7. 20 May, 2015 1 commit
  8. 01 May, 2015 1 commit
  9. 28 Apr, 2015 2 commits
  10. 22 Apr, 2015 2 commits
  11. 21 Apr, 2015 1 commit
  12. 16 Apr, 2015 3 commits
  13. 08 Apr, 2015 1 commit
  14. 04 Apr, 2015 4 commits
  15. 04 Mar, 2015 1 commit
  16. 03 Mar, 2015 1 commit
  17. 18 Feb, 2015 1 commit
  18. 16 Feb, 2015 8 commits
  19. 14 Feb, 2015 8 commits
    • Mike DePaulo's avatar
      CVE-2014-0210: unvalidated length fields in fs_read_list_info() from… · b65259bf
      Mike DePaulo authored
      CVE-2014-0210: unvalidated length fields in fs_read_list_info() from xorg/lib/libXfont commit d338f81df1e188eb16e1d6aeea7f4800f89c1218
      
      fs_read_list_info() parses a reply from the font server.  The reply
      contains a number of additional data items with embedded length or
      count fields, none of which are validated. This can cause out of
      bound reads when looping over these items in the reply.
      b65259bf
    • Mike DePaulo's avatar
      CVE-2014-0210: unvalidated length fields in fs_read_list() from… · ef439da3
      Mike DePaulo authored
      CVE-2014-0210: unvalidated length fields in fs_read_list() from xorg/lib/libXfont commit 5fa73ac18474be3032ee7af9c6e29deab163ea39
      
      fs_read_list() parses a reply from the font server.  The reply
      contains a list of strings with embedded length fields, none of
      which are validated. This can cause out of bound reads when looping
      over the strings in the reply.
      ef439da3
    • Mike DePaulo's avatar
      CVE-2014-0210: unvalidated length fields in fs_read_glyphs() from… · ece51493
      Mike DePaulo authored
      CVE-2014-0210: unvalidated length fields in fs_read_glyphs() from xorg/lib/libXfont commit 520683652564c2a4e42328ae23eef9bb63271565
      
      fs_read_glyphs() parses a reply from the font server.  The reply
      contains embedded length fields, none of which are validated.
      This can cause out of bound reads when looping over the glyph
      bitmaps in the reply.
      ece51493
    • Mike DePaulo's avatar
      CVE-2014-0210: unvalidated length fields in fs_read_extent_info() from… · d2b96c5d
      Mike DePaulo authored
      CVE-2014-0210: unvalidated length fields in fs_read_extent_info() from xorg/lib/libXfont commit a3f21421537620fc4e1f844a594a4bcd9f7e2bd8
      
      Looping over the extents in the reply could go past the end of the
      reply buffer if the reply indicated more extents than could fit in
      the specified reply length.
      d2b96c5d
    • Mike DePaulo's avatar
      CVE-2014-0211: integer overflow in fs_alloc_glyphs() from xorg/lib/libXfont… · a0bed4d9
      Mike DePaulo authored
      CVE-2014-0211: integer overflow in fs_alloc_glyphs() from xorg/lib/libXfont commit a42f707f8a62973f5e8bbcd08afb10a79e9cee33
      
      fs_alloc_glyphs() is a malloc wrapper used by the font code.
      It contains a classic integer overflow in the malloc() call,
      which can cause memory corruption.
      a0bed4d9
    • Mike DePaulo's avatar
      CVE-2014-0211: integer overflow in fs_read_extent_info() from xorg/lib/libXfont… · bb7abd9d
      Mike DePaulo authored
      CVE-2014-0211: integer overflow in fs_read_extent_info() from xorg/lib/libXfont commit c578408c1fd4db09e4e3173f8a9e65c81cc187c1
      
      fs_read_extent_info() parses a reply from the font server.
      The reply contains a 32bit number of elements field which is used
      to calculate a buffer length. There is an integer overflow in this
      calculation which can lead to memory corruption.
      bb7abd9d
    • Mike DePaulo's avatar
      CVE-2014-0210: unvalidated length fields in fs_read_query_info() from… · c6aebf92
      Mike DePaulo authored
      CVE-2014-0210: unvalidated length fields in fs_read_query_info() from xorg/lib/libXfont commit 491291cabf78efdeec8f18b09e14726a9030cc8f
      
      fs_read_query_info() parses a reply from the font server.  The reply
      contains embedded length fields, none of which are validated.  This
      can cause out of bound reads in either fs_read_query_info() or in
      _fs_convert_props() which it calls to parse the fsPropInfo in the reply.
      c6aebf92
    • Mike DePaulo's avatar
      CVE-2014-0211: Integer overflow in fs_get_reply/_fs_start_read from… · 2d724c1a
      Mike DePaulo authored
      CVE-2014-0211: Integer overflow in fs_get_reply/_fs_start_read from xorg/lib/libXfont commit 0f1a5d372c143f91a602bdf10c917d7eabaee09b
      
      fs_get_reply() would take any reply size, multiply it by 4 and pass to
      _fs_start_read.  If that size was bigger than the current reply buffer
      size, _fs_start_read would add it to the existing buffer size plus the
      buffer size increment constant and realloc the buffer to that result.
      
      This math could overflow, causing the code to allocate a smaller
      buffer than the amount it was about to read into that buffer from
      the network.  It could also succeed, allowing the remote font server
      to cause massive allocations in the X server, possibly using up all
      the address space in a 32-bit X server, allowing the triggering of
      other bugs in code that fails to handle malloc failure properly.
      
      This patch protects against both problems, by disconnecting any
      font server trying to feed us more than (the somewhat arbitrary)
      64 mb in a single reply.
      2d724c1a