<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nx-libs/nx-X11/programs/Xserver/include, branch pr/render-cleanup</title>
<subtitle>NXv3 (redistributed) 
</subtitle>
<id>https://cgit.arctica-project.org/nx-libs/atom?h=pr%2Frender-cleanup</id>
<link rel='self' href='https://cgit.arctica-project.org/nx-libs/atom?h=pr%2Frender-cleanup'/>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/'/>
<updated>2015-02-18T02:23:43+00:00</updated>
<entry>
<title>include: introduce byte counting functions.</title>
<updated>2015-02-18T02:23:43+00:00</updated>
<author>
<name>Peter Hutterer</name>
<email>peter.hutterer@who-t.net</email>
</author>
<published>2009-06-29T03:09:57+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=3937db18a203f9936387286b95328f27013a5ffe'/>
<id>urn:sha1:3937db18a203f9936387286b95328f27013a5ffe</id>
<content type='text'>
This patch adds the following three functions:
 bits_to_bytes(bits) - the number of bytes needed to hold 'bits'
 bytes_to_int32(bytes) - the number of 4-byte units to hold 'bytes'
 pad_to_int32(bytes) - the closest multiple of 4 equal to or larger than
                        'bytes'.

All three operations are common in protocol processing and currently the
server has ((foo + 7)/8 + 3)/4 operations all over the place. A common set
of functions reduce the error rate of these (albeit simple) calculations and
improve readability of the code.

The functions do not check for overflow.

v2: backport to nx-libs 3.6.x as a prereq for
the CVE-2015-0255 fix (Mike DePaulo)

Signed-off-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;
</content>
</entry>
<entry>
<title>Xi: unvalidated lengths in Xinput extension [CVE-2014-8095]</title>
<updated>2015-02-14T15:14:32+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-26T18:54:41+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=fde1375e373137ac52d0530b819bf9df64ab14c1'/>
<id>urn:sha1:fde1375e373137ac52d0530b819bf9df64ab14c1</id>
<content type='text'>
Multiple functions in the Xinput extension handling of requests from
clients failed to check that the length of the request sent by the
client was large enough to perform all the required operations and
thus could read or write to memory outside the bounds of the request
buffer.

This commit includes the creation of a new REQUEST_AT_LEAST_EXTRA_SIZE
macro in include/dix.h for the common case of needing to ensure a
request is large enough to include both the request itself and a
minimum amount of extra data following the request header.

v2: backport to nx-libs 3.6.x (Mike DePaulo)

Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;

Conflicts:
	Xi/chgdctl.c
	Xi/chgfctl.c
	Xi/xiallowev.c
	Xi/xichangecursor.c
	Xi/xichangehierarchy.c
	Xi/xigetclientpointer.c
	Xi/xigrabdev.c
	Xi/xipassivegrab.c
	Xi/xiproperty.c
	Xi/xiquerydevice.c
	Xi/xiquerypointer.c
	Xi/xiselectev.c
	Xi/xisetclientpointer.c
	Xi/xisetdevfocus.c
	Xi/xiwarppointer.c

[RHEL5: Xi/xi* files are XI2 ]
</content>
</entry>
<entry>
<title>dix: integer overflow in REQUEST_FIXED_SIZE() [CVE-2014-8092 4/4]</title>
<updated>2015-02-14T15:14:32+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-23T07:44:46+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=82d7279ebfa04f319e68145b3adbf65716e59584'/>
<id>urn:sha1:82d7279ebfa04f319e68145b3adbf65716e59584</id>
<content type='text'>
Force use of 64-bit integers when evaluating data provided by clients
in 32-bit fields which can overflow when added or multiplied during
checks.

Reported-by: Ilja Van Sprundel &lt;ivansprundel@ioactive.com&gt;
Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;

RHEL5: add #include &lt;stdint.h&gt; for uint64_t
v3: backport to nx-libs 3.6.x (Mike DePaulo)
</content>
</entry>
<entry>
<title>dix: integer overflow in RegionSizeof() [CVE-2014-8092 3/4]</title>
<updated>2015-02-14T15:14:32+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-23T06:37:15+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=ed1e13a1f4e316bcf0dc0d4b2c16b1df3f075005'/>
<id>urn:sha1:ed1e13a1f4e316bcf0dc0d4b2c16b1df3f075005</id>
<content type='text'>
RegionSizeof contains several integer overflows if a large length
value is passed in.  Once we fix it to return 0 on overflow, we
also have to fix the callers to handle this error condition

v2: Fixed limit calculation in RegionSizeof as pointed out by jcristau.
v3: backport to nx-libs 3.6.x (Mike DePaulo)

Reported-by: Ilja Van Sprundel &lt;ivansprundel@ioactive.com&gt;
Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;
Reviewed-by: Julien Cristau &lt;jcristau@debian.org&gt;

Conflicts:
	dix/region.c
	include/regionstr.h
</content>
</entry>
<entry>
<title>Provide build support for aarch64 architecture (606_nx-X11_build-on-aarch64.full.patch).</title>
<updated>2015-02-13T12:37:33+00:00</updated>
<author>
<name>Orion Poplawski</name>
<email>orion@cora.nwra.com</email>
</author>
<published>2015-02-13T12:37:33+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=31cdd874cf2ca5b5cfad699ff1d283f0747821e4'/>
<id>urn:sha1:31cdd874cf2ca5b5cfad699ff1d283f0747821e4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>drop .original files from the current code base</title>
<updated>2015-02-02T14:04:01+00:00</updated>
<author>
<name>Mike Gabriel</name>
<email>mike.gabriel@das-netzwerkteam.de</email>
</author>
<published>2015-02-02T14:04:01+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=e399356ed17baf7b50da393a3f13682b01bd14a9'/>
<id>urn:sha1:e399356ed17baf7b50da393a3f13682b01bd14a9</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Imported nx-X11-3.1.0-1.tar.gz</title>
<updated>2011-10-10T15:43:39+00:00</updated>
<author>
<name>Reinhard Tartler</name>
<email>siretart@tauware.de</email>
</author>
<published>2011-10-10T15:43:39+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=f4092abdf94af6a99aff944d6264bc1284e8bdd4'/>
<id>urn:sha1:f4092abdf94af6a99aff944d6264bc1284e8bdd4</id>
<content type='text'>
Summary: Imported nx-X11-3.1.0-1.tar.gz
Keywords:

Imported nx-X11-3.1.0-1.tar.gz
into Git repository
</content>
</entry>
</feed>
