1. 26 Apr, 2015 10 commits
    • Mihai Moldovan's avatar
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: don't escape last newline of a multiline command. · 06bdc272
      Mihai Moldovan authored
      Worked out fine so far, because the next line was empty, but this can
      easily change...
      
      Cherry-picked from Arctica GH 3.6.x branch.
      06bdc272
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: use more curly braces. · cc2fdd96
      Mihai Moldovan authored
      Prevents random characters as being treated as part of a variable name.
      
      Cherry-picked from Arctica GH 3.6.x branch.
      cc2fdd96
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: convert tabs to spaces. · e822d5cd
      Mihai Moldovan authored
      Cherry-picked from Arctica GH 3.6.x branch.
      e822d5cd
    • Mihai Moldovan's avatar
      debian/roll-tarballs.sh: use more quotes. · 02757768
      Mihai Moldovan authored
      Fixes potential bugs, including one triggered by an unquoted hash within
      the command line. BASH accepts this. Other shells do not (i.e., treat
      everything following the hash character as a comment.)
      
      Cherry-picked from Arctica GH 3.6.x branch.
      
      Conflicts:
          debian/roll-tarballs.sh
      02757768
    • Mike Gabriel's avatar
      nxcompshad: Prevent underlinking by linking to libNX_Xext. · 9525d073
      Mike Gabriel authored
      Adds:
          - 0650_nxcompshad_link-to-NX_Xext.full.patch
      9525d073
    • Mike Gabriel's avatar
      nx-X11: Prevent underlinking by linking to libNX_X{11,damage,fixes). · ef24d649
      Mike Gabriel authored
      Adds:
          - 0640_nx-X11_fix-underlinking-libNX_Xcomposite_damage_fixes.full.patch
      ef24d649
    • Mihai Moldovan's avatar
      CVE patches were previously not included in release tarballs. · 96efadac
      Mihai Moldovan authored
      Rename:
          - 1001-LZW-decompress-fix-for-CVE-2011-2895-From-xorg-lib-X.patch =>
            1001-LZW-decompress-fix-for-CVE-2011-2895-From-xorg-.full.patch
          - 1002-Fix-CVE-2011-4028-File-disclosure-vulnerability.-ups.patch =>
            1002-Fix-CVE-2011-4028-File-disclosure-vulnerability.full.patch
          - 1003-Avoid-use-after-free-in-dix-dixfonts.c-doImageText-C.patch =>
            1003-Avoid-use-after-free-in-dix-dixfonts.c-doImageT.full.patch
          - 1004-CVE-2013-6462-unlimited-sscanf-overflows-stack-buffe.patch =>
            1004-CVE-2013-6462-unlimited-sscanf-overflows-stack-.full.patch
          - 1005-CVE-2014-0209-integer-overflow-of-realloc-size-in-Fo.patch =>
            1005-CVE-2014-0209-integer-overflow-of-realloc-size-.full.patch
          - 1006-CVE-2014-0209-integer-overflow-of-realloc-size-in-le.patch =>
            1006-CVE-2014-0209-integer-overflow-of-realloc-size-.full.patch
          - 1007-CVE-2014-0210-unvalidated-length-in-_fs_recv_conn_se.patch =>
            1007-CVE-2014-0210-unvalidated-length-in-_fs_recv_co.full.patch
          - 1008-Don-t-crash-when-we-receive-an-FS_Error-from-the-fon.patch =>
            1008-Don-t-crash-when-we-receive-an-FS_Error-from-th.full.patch
          - 1009-CVE-2014-0210-unvalidated-lengths-when-reading-repli.patch =>
            1009-CVE-2014-0210-unvalidated-lengths-when-reading-.full.patch
          - 1010-CVE-2014-0211-Integer-overflow-in-fs_get_reply-_fs_s.patch =>
            1010-CVE-2014-0211-Integer-overflow-in-fs_get_reply-.full.patch
          - 1011-CVE-2014-0210-unvalidated-length-fields-in-fs_read_q.patch =>
            1011-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1012-CVE-2014-0211-integer-overflow-in-fs_read_extent_inf.patch =>
            1012-CVE-2014-0211-integer-overflow-in-fs_read_exten.full.patch
          - 1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyphs-fr.patch =>
            1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch
          - 1014-CVE-2014-0210-unvalidated-length-fields-in-fs_read_e.patch =>
            1014-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1015-CVE-2014-0210-unvalidated-length-fields-in-fs_read_g.patch =>
            1015-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1016-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch =>
            1016-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1017-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch =>
            1017-CVE-2014-0210-unvalidated-length-fields-in-fs_r.full.patch
          - 1018-unchecked-malloc-may-allow-unauthed-client-to-crash-.patch =>
            1018-unchecked-malloc-may-allow-unauthed-client-to-c.full.patch
          - 1019-dix-integer-overflow-in-ProcPutImage-CVE-2014-8092-1.patch =>
            1019-dix-integer-overflow-in-ProcPutImage-CVE-2014-8.full.patch
          - 1020-dix-integer-overflow-in-GetHosts-CVE-2014-8092-2-4.patch =>
            1020-dix-integer-overflow-in-GetHosts-CVE-2014-8092-.full.patch
          - 1021-dix-integer-overflow-in-RegionSizeof-CVE-2014-8092-3.patch =>
            1021-dix-integer-overflow-in-RegionSizeof-CVE-2014-8.full.patch
          - 1022-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-2014-.patch =>
            1022-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-.full.patch
          - 1023-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls-CVE-.patch =>
            1023-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls.full.patch
          - 1024-Xi-unvalidated-lengths-in-Xinput-extension-CVE-2014-.patch =>
            1024-Xi-unvalidated-lengths-in-Xinput-extension-CVE-.full.patch
          - 1025-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDList-C.patch =>
            1025-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDL.full.patch
          - 1026-Xv-unvalidated-lengths-in-XVideo-extension-swapped-p.patch =>
            1026-Xv-unvalidated-lengths-in-XVideo-extension-swap.full.patch
          - 1027-render-check-request-size-before-reading-it-CVE-2014.patch =>
            1027-render-check-request-size-before-reading-it-CVE.full.patch
          - 1028-render-unvalidated-lengths-in-Render-extn.-swapped-p.patch =>
            1028-render-unvalidated-lengths-in-Render-extn.-swap.full.patch
          - 1029-xfixes-unvalidated-length-in-SProcXFixesSelectSelect.patch =>
            1029-xfixes-unvalidated-length-in-SProcXFixesSelectS.full.patch
          - 1030-randr-unvalidated-lengths-in-RandR-extension-swapped.patch =>
            1030-randr-unvalidated-lengths-in-RandR-extension-sw.full.patch
          - 1031-glx-Be-more-paranoid-about-variable-length-requests-.patch =>
            1031-glx-Be-more-paranoid-about-variable-length-requ.full.patch
          - 1032-glx-Be-more-strict-about-rejecting-invalid-image-siz.patch =>
            1032-glx-Be-more-strict-about-rejecting-invalid-imag.full.patch
          - 1033-glx-Additional-paranoia-in-__glXGetAnswerBuffer-__GL.patch =>
            1033-glx-Additional-paranoia-in-__glXGetAnswerBuffer.full.patch
          - 1034-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6-v4.patch =>
            1034-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6-.full.patch
          - 1035-glx-Length-checking-for-GLXRender-requests-v2-CVE-20.patch =>
            1035-glx-Length-checking-for-GLXRender-requests-v2-C.full.patch
          - 1036-glx-Integer-overflow-protection-for-non-generated-re.patch =>
            1036-glx-Integer-overflow-protection-for-non-generat.full.patch
          - 1037-glx-Top-level-length-checking-for-swapped-VendorPriv.patch =>
            1037-glx-Top-level-length-checking-for-swapped-Vendo.full.patch
          - 1038-glx-Length-checking-for-non-generated-single-request.patch =>
            1038-glx-Length-checking-for-non-generated-single-re.full.patch
          - 1039-glx-Length-checking-for-RenderLarge-requests-v2-CVE-.patch =>
            1039-glx-Length-checking-for-RenderLarge-requests-v2.full.patch
          - 1040-glx-Pass-remaining-request-length-into-varsize-v2-CV.patch =>
            1040-glx-Pass-remaining-request-length-into-varsize-.full.patch
          - 1041-nx-X11-lib-font-fc-fserve.c-initialize-remaining-buf.patch =>
            1041-nx-X11-lib-font-fc-fserve.c-initialize-remainin.full.patch
          - 1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch =>
            1042-Do-proper-input-validation-to-fix-for-CVE-2011-.full.patch
          - 1101-Coverity-844-845-846-Fix-memory-leaks.patch =>
            1101-Coverity-844-845-846-Fix-memory-leaks.full.patch
          - 1102-include-introduce-byte-counting-functions.patch =>
            1102-include-introduce-byte-counting-functions.full.patch
          - 1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input-buff.patch =>
            1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input.full.patch
          - 1104-xkb-Check-strings-length-against-request-size.patch =>
            1104-xkb-Check-strings-length-against-request-size.full.patch
      96efadac
    • Mike Gabriel's avatar
      Security fixes: X.Org CVE-2013-7439: · 79a4ed92
      Mike Gabriel authored
      v2: backport to 3.5.0.x branch. (Mihai Moldovan)
      
      Adds:
        - 1200-CVE-2013-7439-MakeBigReq-don-t-move-the-last-wo.full.patch
      79a4ed92
    • Bernard Cafarelli's avatar
      nx-X11: link to libdl to fix undefined references to 'dlopen' and 'dlsym'. Fixes: #853. · ca361757
      Bernard Cafarelli authored
      v2: generally link to libdl in all of nx-X11. (Mike Gabriel)
      
      Adds:
        - 0630_nx-X11_fix-underlinking-dlopen-dlsym.full.patch
      ca361757
  2. 29 Mar, 2015 3 commits
  3. 25 Mar, 2015 1 commit
    • Mihai Moldovan's avatar
      Only use the first three numbers in the full version for current_version on OS… · a88fc716
      Mihai Moldovan authored
      Only use the first three numbers in the full version for current_version on OS X. ld(1) on 10.6 fails otherwise.
      
      Affected:
        - 0420_nxcomp_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
        - 0620_nxcompext_use-correct-library-naming-scheme-on-OS-X.full.patch
        - 0621_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full.patch
      a88fc716
  4. 17 Mar, 2015 5 commits
  5. 16 Mar, 2015 1 commit
    • Mihai Moldovan's avatar
      nx{comp{,ext,shad},proxy}: try really hard to find makedepend. Do not fail if it is not available. · 06b51cc3
      Mihai Moldovan authored
      Also rename to account for dependency changes:
          - 0070_nxcomp_use-MAKEDEPEND-in-path.full+lite.patch =>
            0410_nxcomp_use-MAKEDEPEND-in-path.full+lite.patch
          - 0071_nxcompext_use-MAKEDEPEND-in-path.full+lite.patch =>
            0610_nxcompext_use-MAKEDEPEND-in-path.full+lite.patch
          - 0072_nxcompshad_use-MAKEDEPEND-in-path.full+lite.patch =>
            0611_nxcompshad_use-MAKEDEPEND-in-path.full+lite.patch
          - 0073_nxproxy_use-MAKEDEPEND-in-path.full+lite.patch =>
            0612_nxproxy_use-MAKEDEPEND-in-path.full+lite.patch
          - 0074_nxcomp_use-dynamiclib-flag-on-OS-X.full+lite.patch =>
            0613_nxcomp_use-dynamiclib-flag-on-OS-X.full+lite.patch
          - 0075_nxcompshad_use-dynamiclib-flag-on-OS-X.full+lite.patch =>
            0614_nxcompshad_use-dynamiclib-flag-on-OS-X.full+lite.patch
          - 0610_nxcompext_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
            =>
            0620_nxcompext_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
          - 0611_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
            =>
            0621_nxcompshad_use-correct-library-naming-scheme-on-OS-X.full+lite.patch
      06b51cc3
  6. 15 Mar, 2015 4 commits
  7. 14 Mar, 2015 2 commits
  8. 13 Mar, 2015 3 commits
  9. 18 Feb, 2015 1 commit
    • Mike DePaulo's avatar
      X.org CVE-2015-0255 patch and its 3 prereq patches · 2b2a02f9
      Mike DePaulo authored
      1101-Coverity-844-845-846-Fix-memory-leaks.patch
      1102-include-introduce-byte-counting-functions.patch
      1103-xkb-Don-t-swap-XkbSetGeometry-data-in-the-input-buff.patc
      1104-xkb-Check-strings-length-against-request-size.patch
      
      (The last patch is the CVE-2015-0255 patch.)
      2b2a02f9
  10. 16 Feb, 2015 8 commits
  11. 14 Feb, 2015 2 commits
    • Mike DePaulo's avatar
    • Mike Gabriel's avatar
      40 patches, fixing several X.Org CVEs in NX. · 45878811
      Mike Gabriel authored
      * Security fixes:
        - Rebase loads of X.Org patches (mainly from RHEL-5) against NX. If not
          all patches from a CVE patch series appear here, then it means that
          the affected file/code is not used in NX at build time.
        - X.Org CVE-2011-2895:
            1001-LZW-decompress-fix-for-CVE-2011-2895-From-xorg-lib-X.patch
        - X.Org CVE-2011-4028:
            1002-Fix-CVE-2011-4028-File-disclosure-vulnerability.-ups.patch
        - X.Org CVE-2013-4396:
            1003-Avoid-use-after-free-in-dix-dixfonts.c-doImageText-C.patch
        - X.Org CVE-2013-6462:
            1004-CVE-2013-6462-unlimited-sscanf-overflows-stack-buffe.patch
        - X.Org CVE-2014-0209:
            1005-CVE-2014-0209-integer-overflow-of-realloc-size-in-Fo.patch
            1006-CVE-2014-0209-integer-overflow-of-realloc-size-in-le.patch
        - X.Org CVE-2014-0210:
            1007-CVE-2014-0210-unvalidated-length-in-_fs_recv_conn_se.patch
            1009-CVE-2014-0210-unvalidated-lengths-when-reading-repli.patch
            1011-CVE-2014-0210-unvalidated-length-fields-in-fs_read_q.patch
            1014-CVE-2014-0210-unvalidated-length-fields-in-fs_read_e.patch
            1015-CVE-2014-0210-unvalidated-length-fields-in-fs_read_g.patch
            1016-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch
            1017-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch
        - X.Org CVE-2014-0211:
            1010-CVE-2014-0211-Integer-overflow-in-fs_get_reply-_fs_s.patch
            1012-CVE-2014-0211-integer-overflow-in-fs_read_extent_inf.patch
            1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyphs-fr.patch
            1018-unchecked-malloc-may-allow-unauthed-client-to-crash-.patch
        - X.Org CVE-2014-8092:
            1019-dix-integer-overflow-in-ProcPutImage-CVE-2014-8092-1.patch
            1020-dix-integer-overflow-in-GetHosts-CVE-2014-8092-2-4.patch
            1021-dix-integer-overflow-in-RegionSizeof-CVE-2014-8092-3.patch
            1022-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-2014-.patch
        - X.Org CVE-2014-8097:
            1023-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls-CVE-.patch
        - X.Org CVE-2014-8095:
            1024-Xi-unvalidated-lengths-in-Xinput-extension-CVE-2014-.patch
        - X.Org CVE-2014-8096:
            1025-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDList-C.patch
        - X.Org CVE-2014-8099:
            1026-Xv-unvalidated-lengths-in-XVideo-extension-swapped-p.patch
        - X.Org CVE-2014-8100:
            1027-render-check-request-size-before-reading-it-CVE-2014.patch
            1028-render-unvalidated-lengths-in-Render-extn.-swapped-p.patch
        - X.Org CVE-2014-8102:
            1029-xfixes-unvalidated-length-in-SProcXFixesSelectSelect.patch
        - X.Org CVE-2014-8101:
            1030-randr-unvalidated-lengths-in-RandR-extension-swapped.patch
        - X.Org CVE-2014-8093:
            1031-glx-Be-more-paranoid-about-variable-length-requests-.patch
            1032-glx-Be-more-strict-about-rejecting-invalid-image-siz.patch
            1033-glx-Additional-paranoia-in-__glXGetAnswerBuffer-__GL.patch
            1034-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6-v4.patch
            1036-glx-Integer-overflow-protection-for-non-generated-re.patch
        - X.Org CVE-2014-8098:
            1035-glx-Length-checking-for-GLXRender-requests-v2-CVE-20.patch
            1037-glx-Top-level-length-checking-for-swapped-VendorPriv.patch
            1038-glx-Length-checking-for-non-generated-single-request.patch
            1039-glx-Length-checking-for-RenderLarge-requests-v2-CVE-.patch
            1040-glx-Pass-remaining-request-length-into-varsize-v2-CV.patch
        - Security fixes with no assigned CVE:
            1008-Don-t-crash-when-we-receive-an-FS_Error-from-the-fon.patch
      45878811