Tag 'libx11-2_1.3.3-4+squeeze1' created by Julien Cristau <jcris...@debian.org> at 2013-05-21 20:59 +0000
Tagging upload of libx11 2:1.3.3-4+squeeze1 to squeeze-security. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAABCAAGBQJRm+A9AAoJEDEBgAUJBeQMewIP/jbPSFHmS8t7mq3C//3yczWO 2REVOOUu7iq29ouiRfK0ob45ySBOJgHDl8tpM/5FNAB0FEVazm+v/8rWDvqYvvPX ccENLZa7MBD9GAxqzn9pzxKL1fK0naU37syu8K6F02SdKTwvdwb4v1Ij2PO23xtj mxCcOv7MMaCWoAzI8OHTg88277kP8Kes0fzX6dUSLfQX3Z1LxO/mTbOLynkZd/y0 uEaAO53ZYjWrVhD2+oe7QvvoRMVzMZdtZdqQqArHvmDAOXRAz3AEDDiPx+Xpq6ay 0f9dy35j1yIFVK2ihsvxubLVV53cPuGl8iiZJJ9oeVuKSZ1mLTFg5mkHb4oTKG9a MasiADC7DUj5K6Xf6v42Vl7ihp1GlcILwPuCFfG+qZw/EaCglb1Ssgn8ev3reLem A2yfMotPcmkG4p/zMPyUtxHr8I7s0oQM5TTKM6kCukRJg9vJLAkRSCd9ox5JDHr9 rvSx4zhiN2zxxZE1/s5pQjBLw9vnUG3BYiKMOacmqNWD18l9X49jYR1XRhVCpjH6 7Y/8AzwuttYExpx7w3sUtFeB+3NPJqov6bPY0UdRVN2xyiml9nYAn2UsEvz6lSPe 2f3nGEN4sz0ughVqGzromvEZK/LzcabZhpFRpy7TloGYa4LvrQiPE6CUc7cqdS7x q58w4abxeBG4F3BJ6F9c =O94z -----END PGP SIGNATURE----- Changes since libx11-2_1.3.3-4: Alan Coopersmith (38): Move repeated #ifdef magic to find PATH_MAX into a common header Add _XEatDataWords to discard a given number of 32-bit words of reply data integer overflow in _XQueryFont() on 32-bit platforms [CVE-2013-1981 1/13] integer overflow in _XF86BigfontQueryFont() [CVE-2013-1981 2/13] integer overflow in XListFontsWithInfo() [CVE-2013-1981 3/13] integer overflow in XGetMotionEvents() [CVE-2013-1981 4/13] integer overflow in XListHosts() [CVE-2013-1981 5/13] unvalidated lengths in XAllocColorCells() [CVE-2013-1997 1/15] unvalidated index in _XkbReadGetDeviceInfoReply() [CVE-2013-1997 2/15] unvalidated indexes in _XkbReadGeomShapes() [CVE-2013-1997 3/15] unvalidated indexes in _XkbReadGetGeometryReply() [CVE-2013-1997 4/15] unvalidated index in _XkbReadKeySyms() [CVE-2013-1997 5/15] unvalidated index in _XkbReadKeyActions() [CVE-2013-1997 6/15] unvalidated index in _XkbReadKeyBehaviors() [CVE-2013-1997 7/15] unvalidated index in _XkbReadModifierMap() [CVE-2013-1997 8/15] unvalidated index in _XkbReadExplicitComponents() [CVE-2013-1997 9/15] unvalidated index in _XkbReadVirtualModMap() [CVE-2013-1997 10/15] unvalidated index/length in _XkbReadGetNamesReply() [CVE-2013-1997 11/15] unvalidated length in _XimXGetReadData() [CVE-2013-1997 12/15] Integer overflows in stringSectionSize() cause buffer overflow in ReadColornameDB() [CVE-2013-1981 6/13] integer overflow in ReadInFile() in Xrm.c [CVE-2013-1981 7/13] Unbounded recursion in GetDatabase() when parsing include files [CVE-2013-2004 1/2] Unbounded recursion in _XimParseStringFile() when parsing include files [CVE-2013-2004 2/2] integer truncation in _XimParseStringFile() [CVE-2013-1981 8/13] ximcp: Prevent memory leak & double free if multiple %L in string integer overflows in TransFileName() [CVE-2013-1981 9/13] integer overflow in XGetWindowProperty() [CVE-2013-1981 10/13] integer overflow in XGetImage() [CVE-2013-1981 11/13] integer overflow in XGetPointerMapping() & XGetKeyboardMapping() [CVE-2013-1981 12/13] integer overflow in XGetModifierMapping() [CVE-2013-1981 13/13] Avoid overflows in XListFonts() [CVE-2013-1997 13/15] Avoid overflows in XGetFontPath() [CVE-2013-1997 14/15] Avoid overflows in XListExtensions() [CVE-2013-1997 15/15] Make XGetWindowProperty() always initialize returned values Convert more _XEatData callers to _XEatDataWords Use calloc in XOpenDisplay to initialize structs containing pointers _XkbReadGetMapReply: reject maxKeyCodes smaller than the minKeyCode Give GNU & Solaris Studio compilers hints about XEatData branches Erkki Seppälä (1): Xrm: Handle the extremely unlikely situation of fstat failing Julien Cristau (3): Hide _XEatDataWords Add a couple fixups for the security patches Upload to squeeze-security Matthieu Herrb (1): XListFontsWithInfo: Re-decrement flist[0] before calling free() on it. Nickolai Zeldovich (1): XListFontsWithInfo: avoid accessing realloc'ed memory --- debian/changelog | 10 ++ debian/patches/001_hide_xeatdatawords.diff | 33 +++++++ debian/patches/002_security_fixups.diff | 43 ++++++++++ debian/patches/series | 2 include/X11/Xlibint.h | 18 ++++ modules/im/ximcp/Makefile.am | 1 modules/im/ximcp/imLcPrs.c | 73 +++++++++++++---- modules/im/ximcp/imTrX.c | 2 src/AllCells.c | 9 +- src/Font.c | 77 +++++++++++------- src/FontInfo.c | 120 ++++++++++++++--------------- src/FontNames.c | 35 +++++--- src/GetAtomNm.c | 4 src/GetDflt.c | 25 ------ src/GetFPath.c | 36 +++++--- src/GetImage.c | 12 +- src/GetMoEv.c | 26 ++---- src/GetPntMap.c | 31 ++++--- src/GetProp.c | 33 +++++-- src/LiHosts.c | 22 +++-- src/LiICmaps.c | 8 - src/LiProps.c | 8 - src/ListExt.c | 36 +++++--- src/Makefile.am | 1 src/ModMap.c | 13 ++- src/OpenDis.c | 15 +-- src/QuColors.c | 10 +- src/QuTree.c | 8 - src/Xrm.c | 30 +++++-- src/XrmI.h | 4 src/pathmax.h | 82 +++++++++++++++++++ src/xcb_io.c | 17 ++++ src/xcms/cmsColNm.c | 27 +++++- src/xkb/XKBExtDev.c | 6 + src/xkb/XKBGeom.c | 15 ++- src/xkb/XKBGetMap.c | 33 +++++++ src/xkb/XKBNames.c | 2 src/xlibi18n/lcFile.c | 24 ----- 38 files changed, 648 insertions(+), 303 deletions(-) --- -- To UNSUBSCRIBE, email to debian-x-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1ug1xt-0002gr...@vasks.debian.org