libX11: Changes to 'master'
GitLab Mirror
gitlab-mirror at kemper.freedesktop.org
Fri Jul 31 13:18:45 UTC 2020
configure.ac | 2 -
modules/im/ximcp/imDefIc.c | 6 +++--
modules/im/ximcp/imDefIm.c | 25 ++++++++++++++-------
modules/im/ximcp/imRmAttr.c | 52 ++++++++++++++++++++++++++++----------------
4 files changed, 56 insertions(+), 29 deletions(-)
New commits:
commit 9949364ea761ab7efa2a9930ec7718f966a740c0
Author: Matthieu Herrb <matthieu at herrb.eu>
Date: Thu Jul 30 21:36:22 2020 +0200
libX11 1.6.10
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
commit 1703b9f3435079d3c6021e1ee2ec34fd4978103d
Author: Matthieu Herrb <matthieu at herrb.eu>
Date: Fri Jul 24 21:09:10 2020 +0200
Change the data_len parameter of _XimAttributeToValue() to CARD16
It's coming from a length in the protocol (unsigned) and passed
to functions that expect unsigned int parameters (_XCopyToArg()
and memcpy()).
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
Reviewed-by: Todd Carson <toc at daybefore.net>
commit 1a566c9e00e5f35c1f9e7f3d741a02e5170852b2
Author: Todd Carson <tc at daybefore.net>
Date: Fri Jul 24 20:59:32 2020 +0200
Zero out buffers in functions
It looks like uninitialized stack or heap memory can leak
out via padding bytes.
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
Reviewed-by: Matthieu Herrb <matthieu at herrb.eu>
commit 2fcfcc49f3b1be854bb9085993a01d17c62acf60
Author: Todd Carson <tc at daybefore.net>
Date: Fri Jul 24 20:22:44 2020 +0200
Fix more unchecked lengths
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
Reviewed-by: Matthieu Herrb <matthieu at herrb.eu>
commit 388b303c62aa35a245f1704211a023440ad2c488
Author: Todd Carson <tc at daybefore.net>
Date: Fri Jul 24 19:36:51 2020 +0200
fix integer overflows in _XimAttributeToValue()
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
Reviewed-by: Matthieu Herrb <matthieu at herrb.eu>
commit 0e6561efcfaa0ae7b5c74eac7e064b76d687544e
Author: Todd Carson <tc at daybefore.net>
Date: Fri Jul 24 19:33:30 2020 +0200
Fix signed length values in _XimGetAttributeID()
The lengths are unsigned according to the specification. Passing
negative values can lead to data corruption.
Signed-off-by: Matthieu Herrb <matthieu at herrb.eu>
Reviewed-by: Matthieu Herrb <matthieu at herrb.eu>
More information about the xorg-commit
mailing list