1. 27 Apr, 2015 2 commits
  2. 26 Apr, 2015 12 commits
    • Mihai Moldovan's avatar
      14e51de1
    • Mihai Moldovan's avatar
      4c90de7a
    • Mihai Moldovan's avatar
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: don't escape last newline of a multiline command. · 06bdc272
      Mihai Moldovan authored
      Worked out fine so far, because the next line was empty, but this can
      easily change...
      
      Cherry-picked from Arctica GH 3.6.x branch.
      06bdc272
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: use more curly braces. · cc2fdd96
      Mihai Moldovan authored
      Prevents random characters as being treated as part of a variable name.
      
      Cherry-picked from Arctica GH 3.6.x branch.
      cc2fdd96
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: convert tabs to spaces. · e822d5cd
      Mihai Moldovan authored
      Cherry-picked from Arctica GH 3.6.x branch.
      e822d5cd
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: use more quotes. · 02757768
      Mihai Moldovan authored
      Fixes potential bugs, including one triggered by an unquoted hash within
      the command line. BASH accepts this. Other shells do not (i.e., treat
      everything following the hash character as a comment.)
      
      Cherry-picked from Arctica GH 3.6.x branch.
      
      Conflicts:
          debian/roll-tarballs.sh
      02757768
    • Mike Gabriel's avatar
      nxcompshad: Prevent underlinking by linking to libNX_Xext. · 9525d073
      Mike Gabriel authored
      Adds:
          - 0650_nxcompshad_link-to-NX_Xext.full.patch
      9525d073
    • Mike Gabriel's avatar
      nx-X11: Prevent underlinking by linking to libNX_X{11,damage,fixes). · ef24d649
      Mike Gabriel authored
      Adds:
          - 0640_nx-X11_fix-underlinking-libNX_Xcomposite_damage_fixes.full.patch
      ef24d649
    • Mihai Moldovan's avatar
      CVE patches were previously not included in release tarballs. · 96efadac
      Mihai Moldovan authored
      Rename:
          - 1001-LZW-decompress-fix-for-CVE-2011-2895-From-xorg-lib-X.patch =>
            1001-LZW-decompress-fix-for-CVE-2011-2895-From-xorg-.full.patch
          - 1002-Fix-CVE-2011-4028-File-disclosure-vulnerability.-ups.patch =>
            1002-Fix-CVE-2011-4028-File-disclosure-vulnerability.full.patch
          - 1003-Avoid-use-after-free-in-dix-dixfonts.c-doImageText-C.patch =>
            1003-Avoid-use-after-free-in-dix-dixfonts.c-doImageT.full.patch
          - 1004-CVE-2013-6462-unlimited-sscanf-overflows-stack-buffe.patch =>
            1004-CVE-2013-6462-unlimited-sscanf-overflows-stack-.full.patch
          - 1005-CVE-2014-0209-integer-overflow-of-realloc-size-in-Fo.patch =>
            1005-CVE-2014-0209-integer-overflow-of-realloc-size-.full.patch
          - 1006-CVE-2014-0209-integer-overflow-of-realloc-size-in-le.patch =>
            1006-CVE-2014-0209-integer-overflow-of-realloc-size-.full.patch
          - 1007-CVE-2014-0210-unvalidated-length-in-_fs_recv_conn_se.patch =>
            1007-CVE-2014-0210-unvalidated-length-in-_fs_recv_co.full.patch
          - 1008-Don-t-crash-when-we-receive-an-FS_Error-from-the-fon.patch =>
            1008-Don-t-crash-when-we-receive-an-FS_Error-from-th.full.patch
          - 1009-CVE-2014-0210-unvalidated-lengths-when-reading-repli.patch =>
            1009-CVE-2014-0210-unvalidated-lengths-when-reading-.full.patch
          - 1010-CVE-2014-0211-Integer-overflow-in-fs_get_reply-_fs_s.patch =>
            1010-CVE-2014-0211-Integer-overflow-in-fs_get_reply-.full.patch
          - 1011-CVE-2014-0210-unvalidated-length-fields-in-fs_read_q.patch =>
            1011-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1012-CVE-2014-0211-integer-overflow-in-fs_read_extent_inf.patch =>
            1012-CVE-2014-0211-integer-overflow-in-fs_read_exten.full.patch
          - 1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyphs-fr.patch =>
            1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch
          - 1014-CVE-2014-0210-unvalidated-length-fields-in-fs_read_e.patch =>
            1014-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1015-CVE-2014-0210-unvalidated-length-fields-in-fs_read_g.patch =>
            1015-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1016-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch =>
            1016-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1017-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch =>
            1017-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1018-unchecked-malloc-may-allow-unauthed-client-to-crash-.patch =>
            1018-unchecked-malloc-may-allow-unauthed-client-to-c.full.patch
          - 1019-dix-integer-overflow-in-ProcPutImage-CVE-2014-8092-1.patch =>
            1019-dix-integer-overflow-in-ProcPutImage-CVE-2014-8.full.patch
          - 1020-dix-integer-overflow-in-GetHosts-CVE-2014-8092-2-4.patch =>
            1020-dix-integer-overflow-in-GetHosts-CVE-2014-8092-.full.patch
          - 1021-dix-integer-overflow-in-RegionSizeof-CVE-2014-8092-3.patch =>
            1021-dix-integer-overflow-in-RegionSizeof-CVE-2014-8.full.patch
          - 1022-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-2014-.patch =>
            1022-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-.full.patch
          - 1023-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls-CVE-.patch =>
            1023-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls.full.patch
          - 1024-Xi-unvalidated-lengths-in-Xinput-extension-CVE-2014-.patch =>
            1024-Xi-unvalidated-lengths-in-Xinput-extension-CVE-.full.patch
          - 1025-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDList-C.patch =>
            1025-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDL.full.patch
          - 1026-Xv-unvalidated-lengths-in-XVideo-extension-swapped-p.patch =>
            1026-Xv-unvalidated-lengths-in-XVideo-extension-swap.full.patch
          - 1027-render-check-request-size-before-reading-it-CVE-2014.patch =>
            1027-render-check-request-size-before-reading-it-CVE.full.patch
          - 1028-render-unvalidated-lengths-in-Render-extn.-swapped-p.patch =>
            1028-render-unvalidated-lengths-in-Render-extn.-swap.full.patch
          - 1029-xfixes-unvalidated-length-in-SProcXFixesSelectSelect.patch =>
            1029-xfixes-unvalidated-length-in-SProcXFixesSelectS.full.patch
          - 1030-randr-unvalidated-lengths-in-RandR-extension-swapped.patch =>
            1030-randr-unvalidated-lengths-in-RandR-extension-sw.full.patch
          - 1031-glx-Be-more-paranoid-about-variable-length-requests-.patch =>
            1031-glx-Be-more-paranoid-about-variable-length-requ.full.patch
          - 1032-glx-Be-more-strict-about-rejecting-invalid-image-siz.patch =>
            1032-glx-Be-more-strict-about-rejecting-invalid-imag.full.patch
          - 1033-glx-Additional-paranoia-in-__glXGetAnswerBuffer-__GL.patch =>
            1033-glx-Additional-paranoia-in-__glXGetAnswerBuffer.full.patch
          - 1034-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6-v4.patch =>
            1034-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6-.full.patch
          - 1035-glx-Length-checking-for-GLXRender-requests-v2-CVE-20.patch =>
            1035-glx-Length-checking-for-GLXRender-requests-v2-C.full.patch
          - 1036-glx-Integer-overflow-protection-for-non-generated-re.patch =>
            1036-glx-Integer-overflow-protection-for-non-generat.full.patch
          - 1037-glx-Top-level-length-checking-for-swapped-VendorPriv.patch =>
            1037-glx-Top-level-length-checking-for-swapped-Vendo.full.patch
          - 1038-glx-Length-checking-for-non-generated-single-request.patch =>
            1038-glx-Length-checking-for-non-generated-single-re.full.patch
          - 1039-glx-Length-checking-for-RenderLarge-requests-v2-CVE-.patch =>
            1039-glx-Length-checking-for-RenderLarge-requests-v2.full.patch
          - 1040-glx-Pass-remaining-request-length-into-varsize-v2-CV.patch =>
            1040-glx-Pass-remaining-request-length-into-varsize-.full.patch
          - 1041-nx-X11-lib-font-fc-fserve.c-initialize-remaining-buf.patch =>
            1041-nx-X11-lib-font-fc-fserve.c-initialize-remainin.full.patch
          - 1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch =>
            1042-Do-proper-input-validation-to-fix-for-CVE-2011-.full.patch
          - 1101-Coverity-844-845-846-Fix-memory-leaks.patch =>
            1101-Coverity-844-845-846-Fix-memory-leaks.full.patch
          - 1102-include-introduce-byte-counting-functions.patch =>
            1102-include-introduce-byte-counting-functions.full.patch
          - 1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input-buff.patch =>
            1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input.full.patch
          - 1104-xkb-Check-strings-length-against-request-size.patch =>
            1104-xkb-Check-strings-length-against-request-size.full.patch
      96efadac
    • Mike Gabriel's avatar
      Security fixes: X.Org CVE-2013-7439: · 79a4ed92
      Mike Gabriel authored
      v2: backport to 3.5.0.x branch. (Mihai Moldovan)
      
      Adds:
        - 1200-CVE-2013-7439-MakeBigReq-don-t-move-the-last-wo.full.patch
      79a4ed92
    • Bernard Cafarelli's avatar
      nx-X11: link to libdl to fix undefined references to 'dlopen' and 'dlsym'. Fixes: #853. · ca361757
      Bernard Cafarelli authored
      v2: generally link to libdl in all of nx-X11. (Mike Gabriel)
      
      Adds:
        - 0630_nx-X11_fix-underlinking-dlopen-dlsym.full.patch
      ca361757
  3. 29 Mar, 2015 3 commits
  4. 25 Mar, 2015 1 commit
    • Mihai Moldovan's avatar
      Only use the first three numbers in the full version for current_version on OS… · a88fc716
      Mihai Moldovan authored
      Only use the first three numbers in the full version for current_version on OS X. ld(1) on 10.6 fails otherwise.
      
      Affected:
        - 0420_nxcomp_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
        - 0620_nxcompext_use-correct-library-naming-scheme-on-OS-X.full.patch
        - 0621_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full.patch
      a88fc716
  5. 17 Mar, 2015 5 commits
  6. 16 Mar, 2015 1 commit
    • Mihai Moldovan's avatar
      nx{comp{,ext,shad},proxy}: try really hard to find makedepend. Do not fail if it is not available. · 06b51cc3
      Mihai Moldovan authored
      Also rename to account for dependency changes:
          - 0070_nxcomp_use-MAKEDEPEND-in-path.full+lite.patch =>
            0410_nxcomp_use-MAKEDEPEND-in-path.full+lite.patch
          - 0071_nxcompext_use-MAKEDEPEND-in-path.full+lite.patch =>
            0610_nxcompext_use-MAKEDEPEND-in-path.full+lite.patch
          - 0072_nxcompshad_use-MAKEDEPEND-in-path.full+lite.patch =>
            0611_nxcompshad_use-MAKEDEPEND-in-path.full+lite.patch
          - 0073_nxproxy_use-MAKEDEPEND-in-path.full+lite.patch =>
            0612_nxproxy_use-MAKEDEPEND-in-path.full+lite.patch
          - 0074_nxcomp_use-dynamiclib-flag-on-OS-X.full+lite.patch =>
            0613_nxcomp_use-dynamiclib-flag-on-OS-X.full+lite.patch
          - 0075_nxcompshad_use-dynamiclib-flag-on-OS-X.full+lite.patch =>
            0614_nxcompshad_use-dynamiclib-flag-on-OS-X.full+lite.patch
          - 0610_nxcompext_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
            =>
            0620_nxcompext_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
          - 0611_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
            =>
            0621_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
      06b51cc3
  7. 15 Mar, 2015 4 commits
  8. 14 Mar, 2015 2 commits
  9. 13 Mar, 2015 3 commits
  10. 18 Feb, 2015 1 commit
    • Mike DePaulo's avatar
      X.org CVE-2015-0255 patch and its 3 prereq patches · 2b2a02f9
      Mike DePaulo authored
      1101-Coverity-844-845-846-Fix-memory-leaks.patch
      1102-include-introduce-byte-counting-functions.patch
      1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input-buff.patc
      1104-xkb-Check-strings-length-against-request-size.patch
      
      (The last patch is the CVE-2015-0255 patch.)
      2b2a02f9
  11. 16 Feb, 2015 6 commits