debian/changelog                              |   15 +
 debian/control                                |    2 
 debian/patches/14_default_screen_section.diff |   16 -
 debian/patches/15_CVE-2007-6427.diff          |  241 ++++++++++++++++++++++++++
 debian/patches/16_CVE-2007-6428.diff          |   12 +
 debian/patches/17_CVE-2007-6429.diff          |  190 ++++++++++++++++++++
 debian/patches/18_CVE-2007-5760.diff          |   13 +
 debian/patches/19_CVE-2007-5958.diff          |   20 ++
 debian/patches/20_CVE-2008-0006.diff          |   18 +
 debian/patches/series                         |    6 
 10 files changed, 520 insertions(+), 13 deletions(-)

New commits:
commit 8b97340f880644b5b98a67ef020a86a326f329d4
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu Jan 17 15:10:17 2008 +0100

    Prepare changelog for upload.

diff --git a/debian/changelog b/debian/changelog
index 2872519..c428455 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
-xorg-server (2:1.4.1~git20080105-2) UNRELEASED; urgency=low
+xorg-server (2:1.4.1~git20080105-2) unstable; urgency=low
 
   [ David Nusinow ]
   * Improve dpms logging patch to correctly label message type
@@ -18,7 +18,7 @@ xorg-server (2:1.4.1~git20080105-2) UNRELEASED; urgency=low
     + CVE-2008-0006: PCF font parser buffer overflow
   * Bump Standards-Version to 3.7.3 (no changes).
 
- -- Julien Cristau <[EMAIL PROTECTED]>  Thu, 17 Jan 2008 01:00:26 +0100
+ -- Julien Cristau <[EMAIL PROTECTED]>  Thu, 17 Jan 2008 15:10:03 +0100
 
 xorg-server (2:1.4.1~git20080105-1) unstable; urgency=low
 

commit a6d8330a56e5a5af5b2352bed07381499f4c748a
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu Jan 17 01:00:50 2008 +0100

    * Bump Standards-Version to 3.7.3 (no changes).

diff --git a/debian/changelog b/debian/changelog
index 66a152d..2872519 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -16,8 +16,9 @@ xorg-server (2:1.4.1~git20080105-2) UNRELEASED; urgency=low
     + CVE-2007-5760: XFree86-Misc Extension Invalid Array Index
     + CVE-2007-5958: file existence disclosure
     + CVE-2008-0006: PCF font parser buffer overflow
+  * Bump Standards-Version to 3.7.3 (no changes).
 
- -- Brice Goglin <[EMAIL PROTECTED]>  Sun, 13 Jan 2008 16:20:12 +0100
+ -- Julien Cristau <[EMAIL PROTECTED]>  Thu, 17 Jan 2008 01:00:26 +0100
 
 xorg-server (2:1.4.1~git20080105-1) unstable; urgency=low
 
diff --git a/debian/control b/debian/control
index 8907850..431ee4c 100644
--- a/debian/control
+++ b/debian/control
@@ -32,7 +32,7 @@ Build-Depends: debhelper (>= 4.0.0), lsb-release, pkg-config, 
bison, flex,
  libxtst-dev (>= 1:0.99.1-1), libxres-dev (>= 1:0.99.1-1),
  libxfixes-dev (>= 1:3.0.0), libdbus-1-dev [!hurd-i386], libhal-dev 
[!hurd-i386]
 Build-Conflicts: xlibs-static-dev
-Standards-Version: 3.7.2.0
+Standards-Version: 3.7.3
 XS-Vcs-Git: git://git.debian.org/git/pkg-xorg/xserver/xorg-server
 XS-Vcs-Browser: http://git.debian.org/?p=pkg-xorg/xserver/xorg-server.git
 

commit 7fe0a909cedc4ad55d3f7708fc98dd6986323d08
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Sat Jan 12 01:04:06 2008 +0100

    * Fix multiple security issues
      + CVE-2007-6427: XInput Extension Memory Corruption
      + CVE-2007-6428: TOG-CUP Extension Memory Corruption
      + CVE-2007-6429: EVI Extension Integer Overflow,
                       MIT-SHM Extension Integer Overflow
      + CVE-2007-5760: XFree86-Misc Extension Invalid Array Index
      + CVE-2007-5958: file existence disclosure
      + CVE-2008-0006: PCF font parser buffer overflow

diff --git a/debian/changelog b/debian/changelog
index f57f7f6..66a152d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -7,6 +7,16 @@ xorg-server (2:1.4.1~git20080105-2) UNRELEASED; urgency=low
   * Grab upstream commit db9ae863536fff80b5463d99e71dc47ae587980d
     to set DEFAULT_DPI to 96 instead of 75.
 
+  [ Julien Cristau ]
+  * Fix multiple security issues
+    + CVE-2007-6427: XInput Extension Memory Corruption
+    + CVE-2007-6428: TOG-CUP Extension Memory Corruption
+    + CVE-2007-6429: EVI Extension Integer Overflow,
+                     MIT-SHM Extension Integer Overflow
+    + CVE-2007-5760: XFree86-Misc Extension Invalid Array Index
+    + CVE-2007-5958: file existence disclosure
+    + CVE-2008-0006: PCF font parser buffer overflow
+
  -- Brice Goglin <[EMAIL PROTECTED]>  Sun, 13 Jan 2008 16:20:12 +0100
 
 xorg-server (2:1.4.1~git20080105-1) unstable; urgency=low
diff --git a/debian/patches/14_default_screen_section.diff 
b/debian/patches/14_default_screen_section.diff
index a3b6061..709261b 100644
--- a/debian/patches/14_default_screen_section.diff
+++ b/debian/patches/14_default_screen_section.diff
@@ -1,8 +1,6 @@
-Index: xorg-server/hw/xfree86/common/xf86Config.c
-===================================================================
---- xorg-server.orig/hw/xfree86/common/xf86Config.c    2007-12-12 
19:43:59.000000000 -0500
-+++ xorg-server/hw/xfree86/common/xf86Config.c 2007-12-12 19:44:10.000000000 
-0500
-@@ -1801,11 +1801,6 @@
+--- xorg-server.orig/hw/xfree86/common/xf86Config.c
++++ xorg-server/hw/xfree86/common/xf86Config.c
+@@ -1800,11 +1800,6 @@
      if (!servlayoutp)
        return FALSE;
  
@@ -14,7 +12,7 @@ Index: xorg-server/hw/xfree86/common/xf86Config.c
      /*
       * which screen section is the active one?
       *
-@@ -1893,6 +1888,12 @@
+@@ -1892,6 +1887,12 @@
      XF86ConfAdaptorLinkPtr conf_adaptor;
      Bool defaultMonitor = FALSE;
  
@@ -27,10 +25,8 @@ Index: xorg-server/hw/xfree86/common/xf86Config.c
      xf86Msg(from, "|-->Screen \"%s\" (%d)\n", conf_screen->scrn_identifier,
            scrnum);
      /*
-Index: xorg-server/hw/xfree86/parser/Screen.c
-===================================================================
---- xorg-server.orig/hw/xfree86/parser/Screen.c        2007-12-12 
19:43:02.000000000 -0500
-+++ xorg-server/hw/xfree86/parser/Screen.c     2007-12-12 19:44:10.000000000 
-0500
+--- xorg-server.orig/hw/xfree86/parser/Screen.c
++++ xorg-server/hw/xfree86/parser/Screen.c
 @@ -498,12 +498,6 @@
        XF86ConfDevicePtr device;
        XF86ConfAdaptorLinkPtr adaptor;
diff --git a/debian/patches/15_CVE-2007-6427.diff 
b/debian/patches/15_CVE-2007-6427.diff
new file mode 100644
index 0000000..da62c5e
--- /dev/null
+++ b/debian/patches/15_CVE-2007-6427.diff
@@ -0,0 +1,241 @@
+#
+# Updated but not checked in:
+#   (will commit)
+#
+#      modified: Xi/chgfctl.c
+#      modified: Xi/chgkmap.c
+#      modified: Xi/chgprop.c
+#      modified: Xi/grabdev.c
+#      modified: Xi/grabdevb.c
+#      modified: Xi/grabdevk.c
+#      modified: Xi/selectev.c
+#      modified: Xi/sendexev.c
+#
+--- xorg-server.orig/Xi/chgfctl.c
++++ xorg-server/Xi/chgfctl.c
+@@ -327,18 +327,13 @@
+                    xStringFeedbackCtl * f)
+ {
+     char n;
+-    long *p;
+     int i, j;
+     KeySym *syms, *sup_syms;
+ 
+     syms = (KeySym *) (f + 1);
+     if (client->swapped) {
+       swaps(&f->length, n);   /* swapped num_keysyms in calling proc */
+-      p = (long *)(syms);
+-      for (i = 0; i < f->num_keysyms; i++) {
+-          swapl(p, n);
+-          p++;
+-      }
++      SwapLongs((CARD32 *) syms, f->num_keysyms);
+     }
+ 
+     if (f->num_keysyms > s->ctrl.max_symbols) {
+--- xorg-server.orig/Xi/chgkmap.c
++++ xorg-server/Xi/chgkmap.c
+@@ -79,18 +79,14 @@
+ SProcXChangeDeviceKeyMapping(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i, count;
++    unsigned int count;
+ 
+     REQUEST(xChangeDeviceKeyMappingReq);
+     swaps(&stuff->length, n);
+     REQUEST_AT_LEAST_SIZE(xChangeDeviceKeyMappingReq);
+-    p = (long *)&stuff[1];
+     count = stuff->keyCodes * stuff->keySymsPerKeyCode;
+-    for (i = 0; i < count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    REQUEST_FIXED_SIZE(xChangeDeviceKeyMappingReq, count * sizeof(CARD32));
++    SwapLongs((CARD32 *) (&stuff[1]), count);
+     return (ProcXChangeDeviceKeyMapping(client));
+ }
+ 
+@@ -106,10 +102,14 @@
+     int ret;
+     unsigned len;
+     DeviceIntPtr dev;
++    unsigned int count;
+ 
+     REQUEST(xChangeDeviceKeyMappingReq);
+     REQUEST_AT_LEAST_SIZE(xChangeDeviceKeyMappingReq);
+ 
++    count = stuff->keyCodes * stuff->keySymsPerKeyCode;
++    REQUEST_FIXED_SIZE(xChangeDeviceKeyMappingReq, count * sizeof(CARD32));
++    
+     dev = LookupDeviceIntRec(stuff->deviceid);
+     if (dev == NULL) {
+       SendErrorToClient(client, IReqCode, X_ChangeDeviceKeyMapping, 0,
+--- xorg-server.orig/Xi/chgprop.c
++++ xorg-server/Xi/chgprop.c
+@@ -81,19 +81,15 @@
+ SProcXChangeDeviceDontPropagateList(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i;
+ 
+     REQUEST(xChangeDeviceDontPropagateListReq);
+     swaps(&stuff->length, n);
+     REQUEST_AT_LEAST_SIZE(xChangeDeviceDontPropagateListReq);
+     swapl(&stuff->window, n);
+     swaps(&stuff->count, n);
+-    p = (long *)&stuff[1];
+-    for (i = 0; i < stuff->count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    REQUEST_FIXED_SIZE(xChangeDeviceDontPropagateListReq,
++                     stuff->count * sizeof(CARD32));
++    SwapLongs((CARD32 *) (&stuff[1]), stuff->count);
+     return (ProcXChangeDeviceDontPropagateList(client));
+ }
+ 
+--- xorg-server.orig/Xi/grabdev.c
++++ xorg-server/Xi/grabdev.c
+@@ -82,8 +82,6 @@
+ SProcXGrabDevice(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i;
+ 
+     REQUEST(xGrabDeviceReq);
+     swaps(&stuff->length, n);
+@@ -91,11 +89,11 @@
+     swapl(&stuff->grabWindow, n);
+     swapl(&stuff->time, n);
+     swaps(&stuff->event_count, n);
+-    p = (long *)&stuff[1];
+-    for (i = 0; i < stuff->event_count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++
++    if (stuff->length != (sizeof(xGrabDeviceReq) >> 2) + stuff->event_count)
++      return BadLength;
++    
++    SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
+ 
+     return (ProcXGrabDevice(client));
+ }
+--- xorg-server.orig/Xi/grabdevb.c
++++ xorg-server/Xi/grabdevb.c
+@@ -80,8 +80,6 @@
+ SProcXGrabDeviceButton(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i;
+ 
+     REQUEST(xGrabDeviceButtonReq);
+     swaps(&stuff->length, n);
+@@ -89,11 +87,9 @@
+     swapl(&stuff->grabWindow, n);
+     swaps(&stuff->modifiers, n);
+     swaps(&stuff->event_count, n);
+-    p = (long *)&stuff[1];
+-    for (i = 0; i < stuff->event_count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    REQUEST_FIXED_SIZE(xGrabDeviceButtonReq,
++                     stuff->event_count * sizeof(CARD32));
++    SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
+ 
+     return (ProcXGrabDeviceButton(client));
+ }
+--- xorg-server.orig/Xi/grabdevk.c
++++ xorg-server/Xi/grabdevk.c
+@@ -80,8 +80,6 @@
+ SProcXGrabDeviceKey(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i;
+ 
+     REQUEST(xGrabDeviceKeyReq);
+     swaps(&stuff->length, n);
+@@ -89,11 +87,8 @@
+     swapl(&stuff->grabWindow, n);
+     swaps(&stuff->modifiers, n);
+     swaps(&stuff->event_count, n);
+-    p = (long *)&stuff[1];
+-    for (i = 0; i < stuff->event_count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    REQUEST_FIXED_SIZE(xGrabDeviceKeyReq, stuff->event_count * 
sizeof(CARD32));
++    SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
+     return (ProcXGrabDeviceKey(client));
+ }
+ 
+--- xorg-server.orig/Xi/selectev.c
++++ xorg-server/Xi/selectev.c
+@@ -131,19 +131,16 @@
+ SProcXSelectExtensionEvent(ClientPtr client)
+ {
+     char n;
+-    long *p;
+-    int i;
+ 
+     REQUEST(xSelectExtensionEventReq);
+     swaps(&stuff->length, n);
+     REQUEST_AT_LEAST_SIZE(xSelectExtensionEventReq);
+     swapl(&stuff->window, n);
+     swaps(&stuff->count, n);
+-    p = (long *)&stuff[1];
+-    for (i = 0; i < stuff->count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    REQUEST_FIXED_SIZE(xSelectExtensionEventReq,
++                     stuff->count * sizeof(CARD32));
++    SwapLongs((CARD32 *) (&stuff[1]), stuff->count);
++
+     return (ProcXSelectExtensionEvent(client));
+ }
+ 
+--- xorg-server.orig/Xi/sendexev.c
++++ xorg-server/Xi/sendexev.c
+@@ -83,7 +83,7 @@
+ SProcXSendExtensionEvent(ClientPtr client)
+ {
+     char n;
+-    long *p;
++    CARD32 *p;
+     int i;
+     xEvent eventT;
+     xEvent *eventP;
+@@ -94,6 +94,11 @@
+     REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
+     swapl(&stuff->destination, n);
+     swaps(&stuff->count, n);
++
++    if (stuff->length != (sizeof(xSendExtensionEventReq) >> 2) + stuff->count 
+
++      (stuff->num_events * (sizeof(xEvent) >> 2)))
++      return BadLength;
++    
+     eventP = (xEvent *) & stuff[1];
+     for (i = 0; i < stuff->num_events; i++, eventP++) {
+       proc = EventSwapVector[eventP->u.u.type & 0177];
+@@ -103,11 +108,8 @@
+       *eventP = eventT;
+     }
+ 
+-    p = (long *)(((xEvent *) & stuff[1]) + stuff->num_events);
+-    for (i = 0; i < stuff->count; i++) {
+-      swapl(p, n);
+-      p++;
+-    }
++    p = (CARD32 *)(((xEvent *) & stuff[1]) + stuff->num_events);
++    SwapLongs(p, stuff->count);
+     return (ProcXSendExtensionEvent(client));
+ }
+ 
diff --git a/debian/patches/16_CVE-2007-6428.diff 
b/debian/patches/16_CVE-2007-6428.diff
new file mode 100644
index 0000000..4068315
--- /dev/null
+++ b/debian/patches/16_CVE-2007-6428.diff
@@ -0,0 +1,12 @@
+--- xorg-server.orig/Xext/cup.c
++++ xorg-server/Xext/cup.c
+@@ -196,6 +196,9 @@
+ 
+     REQUEST_SIZE_MATCH (xXcupGetReservedColormapEntriesReq);
+ 
++    if (stuff->screen >= screenInfo.numScreens)
++      return BadValue;
++
+ #ifndef HAVE_SPECIAL_DESKTOP_COLORS
+     citems[CUP_BLACK_PIXEL].pixel = 
+       screenInfo.screens[stuff->screen]->blackPixel;
diff --git a/debian/patches/17_CVE-2007-6429.diff 
b/debian/patches/17_CVE-2007-6429.diff
new file mode 100644
index 0000000..5c6d548
--- /dev/null
+++ b/debian/patches/17_CVE-2007-6429.diff
@@ -0,0 +1,190 @@
+--- xorg-server.orig/Xext/EVI.c
++++ xorg-server/Xext/EVI.c
+@@ -34,6 +34,7 @@
+ #include <X11/extensions/XEVIstr.h>
+ #include "EVIstruct.h"
+ #include "modinit.h"
++#include "scrnintstr.h"
+ 
+ #if 0
+ static unsigned char XEVIReqCode = 0;
+@@ -87,10 +88,22 @@
+ {
+     REQUEST(xEVIGetVisualInfoReq);
+     xEVIGetVisualInfoReply rep;
+-    int n, n_conflict, n_info, sz_info, sz_conflict;
++    int i, n, n_conflict, n_info, sz_info, sz_conflict;
+     VisualID32 *conflict;
++    unsigned int total_visuals = 0;
+     xExtendedVisualInfo *eviInfo;
+     int status;
++
++    /*
++     * do this first, otherwise REQUEST_FIXED_SIZE can overflow.  we assume
++     * here that you don't have more than 2^32 visuals over all your screens;
++     * this seems like a safe assumption.
++     */
++    for (i = 0; i < screenInfo.numScreens; i++)
++      total_visuals += screenInfo.screens[i]->numVisuals;
++    if (stuff->n_visual > total_visuals)
++      return BadValue;
++
+     REQUEST_FIXED_SIZE(xEVIGetVisualInfoReq, stuff->n_visual * sz_VisualID32);
+     status = eviPriv->getVisualInfo((VisualID32 *)&stuff[1], 
(int)stuff->n_visual,
+               &eviInfo, &n_info, &conflict, &n_conflict);
+--- xorg-server.orig/Xext/sampleEVI.c
++++ xorg-server/Xext/sampleEVI.c
+@@ -34,6 +34,13 @@
+ #include <X11/extensions/XEVIstr.h>
+ #include "EVIstruct.h"
+ #include "scrnintstr.h"
++
++#if HAVE_STDINT_H
++#include <stdint.h>
++#elif !defined(INT_MAX)
++#define UINT32_MAX 0xffffffffU
++#endif
++
+ static int sampleGetVisualInfo(
+     VisualID32 *visual,
+     int n_visual,
+@@ -42,24 +49,36 @@
+     VisualID32 **conflict_rn,
+     int *n_conflict_rn)
+ {
+-    int max_sz_evi = n_visual * sz_xExtendedVisualInfo * 
screenInfo.numScreens;
++    unsigned int max_sz_evi;
+     VisualID32 *temp_conflict;
+     xExtendedVisualInfo *evi;
+-    int max_visuals = 0, max_sz_conflict, sz_conflict = 0;
++    unsigned int max_visuals = 0, max_sz_conflict, sz_conflict = 0;
+     register int visualI, scrI, sz_evi = 0, conflictI, n_conflict;
+-    *evi_rn = evi = (xExtendedVisualInfo *)xalloc(max_sz_evi);
+-    if (!*evi_rn)
+-         return BadAlloc;
++
++    if (n_visual > UINT32_MAX/(sz_xExtendedVisualInfo * 
screenInfo.numScreens))
++      return BadAlloc;
++    max_sz_evi = n_visual * sz_xExtendedVisualInfo * screenInfo.numScreens;
++    
+     for (scrI = 0; scrI < screenInfo.numScreens; scrI++) {
+         if (screenInfo.screens[scrI]->numVisuals > max_visuals)
+             max_visuals = screenInfo.screens[scrI]->numVisuals;
+     }
++
++    if (n_visual > UINT32_MAX/(sz_VisualID32 * screenInfo.numScreens 
++                             * max_visuals)) 
++      return BadAlloc;
+     max_sz_conflict = n_visual * sz_VisualID32 * screenInfo.numScreens * 
max_visuals;
++
++    *evi_rn = evi = (xExtendedVisualInfo *)xalloc(max_sz_evi);
++    if (!*evi_rn)
++         return BadAlloc;
++
+     temp_conflict = (VisualID32 *)xalloc(max_sz_conflict);
+     if (!temp_conflict) {
+         xfree(*evi_rn);
+         return BadAlloc;
+     }
++
+     for (scrI = 0; scrI < screenInfo.numScreens; scrI++) {
+         for (visualI = 0; visualI < n_visual; visualI++) {
+           evi[sz_evi].core_visual_id = visual[visualI];
+--- xorg-server.orig/Xext/shm.c
++++ xorg-server/Xext/shm.c
+@@ -711,6 +711,8 @@
+     int i, j, result, rc;
+     ShmDescPtr shmdesc;
+     REQUEST(xShmCreatePixmapReq);
++    unsigned int width, height, depth;
++    unsigned long size;
+     PanoramiXRes *newPix;
+ 
+     REQUEST_SIZE_MATCH(xShmCreatePixmapReq);
+@@ -724,11 +726,26 @@
+       return rc;
+ 
+     VERIFY_SHMPTR(stuff->shmseg, stuff->offset, TRUE, shmdesc, client);
+-    if (!stuff->width || !stuff->height)
++
++    width = stuff->width;
++    height = stuff->height;
++    depth = stuff->depth;
++    if (!width || !height || !depth)
+     {
+       client->errorValue = 0;
+         return BadValue;
+     }
++    if (width > 32767 || height > 32767)
++        return BadAlloc;
++    size = PixmapBytePad(width, depth) * height;
++    if (sizeof(size) == 4) {
++        if (size < width * height)
++            return BadAlloc;
++        /* thankfully, offset is unsigned */
++        if (stuff->offset + size < size)
++            return BadAlloc;
++    }
++
+     if (stuff->depth != 1)
+     {
+         pDepth = pDraw->pScreen->allowedDepths;
+@@ -739,9 +756,7 @@
+         return BadValue;
+     }
+ CreatePmap:
+-    VERIFY_SHMSIZE(shmdesc, stuff->offset,
+-                 PixmapBytePad(stuff->width, stuff->depth) * stuff->height,
+-                 client);
++    VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
+ 
+     if(!(newPix = (PanoramiXRes *) xalloc(sizeof(PanoramiXRes))))
+       return BadAlloc;
+@@ -1040,6 +1055,8 @@
+     register int i, rc;
+     ShmDescPtr shmdesc;
+     REQUEST(xShmCreatePixmapReq);
++    unsigned int width, height, depth;
++    unsigned long size;
+ 
+     REQUEST_SIZE_MATCH(xShmCreatePixmapReq);
+     client->errorValue = stuff->pid;
+@@ -1052,11 +1069,26 @@
+       return rc;
+ 
+     VERIFY_SHMPTR(stuff->shmseg, stuff->offset, TRUE, shmdesc, client);
+-    if (!stuff->width || !stuff->height)
++    
++    width = stuff->width;
++    height = stuff->height;
++    depth = stuff->depth;
++    if (!width || !height || !depth)
+     {
+       client->errorValue = 0;
+         return BadValue;
+     }
++    if (width > 32767 || height > 32767)
++      return BadAlloc;
++    size = PixmapBytePad(width, depth) * height;
++    if (sizeof(size) == 4) {
++      if (size < width * height)
++          return BadAlloc;
++      /* thankfully, offset is unsigned */
++      if (stuff->offset + size < size)
++          return BadAlloc;
++    }
++
+     if (stuff->depth != 1)
+     {
+         pDepth = pDraw->pScreen->allowedDepths;
+@@ -1067,9 +1099,7 @@
+         return BadValue;
+     }
+ CreatePmap:
+-    VERIFY_SHMSIZE(shmdesc, stuff->offset,
+-                 PixmapBytePad(stuff->width, stuff->depth) * stuff->height,
+-                 client);
++    VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
+     pMap = (*shmFuncs[pDraw->pScreen->myNum]->CreatePixmap)(
+                           pDraw->pScreen, stuff->width,
+                           stuff->height, stuff->depth,
diff --git a/debian/patches/18_CVE-2007-5760.diff 
b/debian/patches/18_CVE-2007-5760.diff
new file mode 100644
index 0000000..6df89ae
--- /dev/null
+++ b/debian/patches/18_CVE-2007-5760.diff
@@ -0,0 +1,13 @@
+--- xorg-server.orig/hw/xfree86/common/xf86MiscExt.c
++++ xorg-server/hw/xfree86/common/xf86MiscExt.c
+@@ -548,6 +548,10 @@
+ {
+     ScrnInfoPtr pScr = xf86Screens[scrnIndex];
+ 
++    /* should check this in the protocol, but xf86NumScreens isn't exported */
++    if (scrnIndex > xf86NumScreens)
++      return BadValue;
++
+     if (*pScr->HandleMessage == NULL)
+           return BadImplementation;
+     return (*pScr->HandleMessage)(scrnIndex, msgtype, msgval, retstr);
diff --git a/debian/patches/19_CVE-2007-5958.diff 
b/debian/patches/19_CVE-2007-5958.diff
new file mode 100644
index 0000000..44b88e5
--- /dev/null
+++ b/debian/patches/19_CVE-2007-5958.diff
@@ -0,0 +1,20 @@
+--- xorg-server.orig/Xext/security.c
++++ xorg-server/Xext/security.c
+@@ -1563,7 +1563,7 @@
+     if (!SecurityPolicyFile)
+       return;
+ 
+-    f = fopen(SecurityPolicyFile, "r");
++    f = Fopen(SecurityPolicyFile, "r");
+     if (!f)
+     {
+       ErrorF("error opening security policy file %s\n",
+@@ -1646,7 +1646,7 @@
+     }
+ #endif /* PROPDEBUG */
+ 
+-    fclose(f);
++    Fclose(f);
+ } /* SecurityLoadPropertyAccessList */
+ 
+ 
diff --git a/debian/patches/20_CVE-2008-0006.diff 
b/debian/patches/20_CVE-2008-0006.diff
new file mode 100644
index 0000000..d16694a
--- /dev/null
+++ b/debian/patches/20_CVE-2008-0006.diff
@@ -0,0 +1,18 @@
+diff --git a/dix/dixfonts.c b/dix/dixfonts.c
+index c21b3ec..7bb2404 100644
+--- a/dix/dixfonts.c
++++ b/dix/dixfonts.c
+@@ -325,6 +325,13 @@ doOpenFont(ClientPtr client, OFclosurePtr c)
+       err = BadFontName;
+       goto bail;
+     }
++    /* check values for firstCol, lastCol, firstRow, and lastRow */
++    if (pfont->info.firstCol > pfont->info.lastCol ||
++       pfont->info.firstRow > pfont->info.lastRow ||
++       pfont->info.lastCol - pfont->info.firstCol > 255) {
++       err = AllocError;
++       goto bail;
++    }
+     if (!pfont->fpe)
+       pfont->fpe = fpe;
+     pfont->refcnt++;
diff --git a/debian/patches/series b/debian/patches/series
index 2e363d1..baafbbe 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -9,6 +9,12 @@
 10_dont_look_in_home_for_config.diff -p0
 13_debian_add_xkbpath_env_variable.diff
 14_default_screen_section.diff
+15_CVE-2007-6427.diff
+16_CVE-2007-6428.diff
+17_CVE-2007-6429.diff
+18_CVE-2007-5760.diff
+19_CVE-2007-5958.diff
+20_CVE-2008-0006.diff
 21_glx_align_fixes.patch
 40_default_dpi_96.patch
 41_vbe_filter_less.diff


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to