<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nx-libs/nx-X11/programs/Xserver/os, branch pr/render-cleanup</title>
<subtitle>NXv3 (redistributed) 
</subtitle>
<id>https://cgit.arctica-project.org/nx-libs/atom?h=pr%2Frender-cleanup</id>
<link rel='self' href='https://cgit.arctica-project.org/nx-libs/atom?h=pr%2Frender-cleanup'/>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/'/>
<updated>2015-04-28T03:09:09+00:00</updated>
<entry>
<title>imake cleanup: Drop references to X11 build-logic that is not present in nx-X11.</title>
<updated>2015-04-28T03:09:09+00:00</updated>
<author>
<name>Mike Gabriel</name>
<email>mike.gabriel@das-netzwerkteam.de</email>
</author>
<published>2015-04-21T22:37:47+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=662a89545f3e953a47f176cf64e574350643d446'/>
<id>urn:sha1:662a89545f3e953a47f176cf64e574350643d446</id>
<content type='text'>
</content>
</entry>
<entry>
<title>library clean-up: Don't build and link libXfont.a anymore. Use system's libXfont shared library and link dynamically.</title>
<updated>2015-04-22T04:22:37+00:00</updated>
<author>
<name>Mike Gabriel</name>
<email>mike.gabriel@das-netzwerkteam.de</email>
</author>
<published>2015-04-14T07:24:55+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=70b77a0fc329e2e205a596a738c7307d354e7b1c'/>
<id>urn:sha1:70b77a0fc329e2e205a596a738c7307d354e7b1c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>imake cleanup: Drop all references to XprtServer and BuildXprint*.</title>
<updated>2015-04-04T08:59:50+00:00</updated>
<author>
<name>Mike Gabriel</name>
<email>mike.gabriel@das-netzwerkteam.de</email>
</author>
<published>2015-03-04T12:29:02+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=f5f280417cb0af489406c8c3234e4ad69b008c74'/>
<id>urn:sha1:f5f280417cb0af489406c8c3234e4ad69b008c74</id>
<content type='text'>
</content>
</entry>
<entry>
<title>dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]</title>
<updated>2015-02-16T04:58:21+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-07T07:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=b6b5b14e4190048fadbfbcf063d873d318127e81'/>
<id>urn:sha1:b6b5b14e4190048fadbfbcf063d873d318127e81</id>
<content type='text'>
GetHosts() iterates over all the hosts it has in memory, and copies
them to a buffer. The buffer length is calculated by iterating over
all the hosts and adding up all of their combined length. There is a
potential integer overflow, if there are lots and lots of hosts (with
a combined length of &gt; ~4 gig). This should be possible by repeatedly
calling ProcChangeHosts() on 64bit machines with enough memory.

This patch caps the list at 1mb, because multi-megabyte hostname
lists for X access control are insane.

v2: backport to nx-libs 3.6.x (Mike DePaulo)
v3: human-readable version of "1 MB" (Mihai Moldovan)
Reported-by: Ilja Van Sprundel &lt;ivansprundel@ioactive.com&gt;
Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;

Conflicts:
	os/access.c
</content>
</entry>
<entry>
<title>Revert "dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]"</title>
<updated>2015-02-16T04:55:23+00:00</updated>
<author>
<name>Mihai Moldovan</name>
<email>ionic@ionic.de</email>
</author>
<published>2015-02-16T04:55:23+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=03a2922d9cc17af26bd91d4a471061c54db50789'/>
<id>urn:sha1:03a2922d9cc17af26bd91d4a471061c54db50789</id>
<content type='text'>
This reverts commit d4c76981f7fddb364166464c571ed8d3de3086cd.
</content>
</entry>
<entry>
<title>dix: integer overflow in GetHosts() [CVE-2014-8092 2/4]</title>
<updated>2015-02-14T15:14:31+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-07T07:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=d4c76981f7fddb364166464c571ed8d3de3086cd'/>
<id>urn:sha1:d4c76981f7fddb364166464c571ed8d3de3086cd</id>
<content type='text'>
GetHosts() iterates over all the hosts it has in memory, and copies
them to a buffer. The buffer length is calculated by iterating over
all the hosts and adding up all of their combined length. There is a
potential integer overflow, if there are lots and lots of hosts (with
a combined length of &gt; ~4 gig). This should be possible by repeatedly
calling ProcChangeHosts() on 64bit machines with enough memory.

This patch caps the list at 1mb, because multi-megabyte hostname
lists for X access control are insane.

v2: backport to nx-libs 3.6.x (Mike DePaulo)
Reported-by: Ilja Van Sprundel &lt;ivansprundel@ioactive.com&gt;
Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;

Conflicts:
	os/access.c
</content>
</entry>
<entry>
<title>unchecked malloc may allow unauthed client to crash Xserver [CVE-2014-8091]</title>
<updated>2015-02-14T15:14:31+00:00</updated>
<author>
<name>Alan Coopersmith</name>
<email>alan.coopersmith@oracle.com</email>
</author>
<published>2014-01-18T02:54:03+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=37e7fb1f64b29ef06ec4d69ab0b7afa99c613383'/>
<id>urn:sha1:37e7fb1f64b29ef06ec4d69ab0b7afa99c613383</id>
<content type='text'>
authdes_ezdecode() calls malloc() using a length provided by the
connection handshake sent by a newly connected client in order
to authenticate to the server, so should be treated as untrusted.

It didn't check if malloc() failed before writing to the newly
allocated buffer, so could lead to a server crash if the server
fails to allocate memory (up to UINT16_MAX bytes, since the len
field is a CARD16 in the X protocol).

Reported-by: Ilja Van Sprundel &lt;ivansprundel@ioactive.com&gt;
Signed-off-by: Alan Coopersmith &lt;alan.coopersmith@oracle.com&gt;
Reviewed-by: Peter Hutterer &lt;peter.hutterer@who-t.net&gt;

Conflicts:
	os/rpcauth.c
</content>
</entry>
<entry>
<title>Fix CVE-2011-4028: File disclosure vulnerability. upstream xorg/xserver commit 6ba44b91e37622ef8c146d8f2ac92d708a18ed34</title>
<updated>2015-02-14T15:14:31+00:00</updated>
<author>
<name>Mike DePaulo</name>
<email>mikedep333@gmail.com</email>
</author>
<published>2015-02-09T00:16:38+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=df4a3b7270539843ae76275485ca76efcdf361d9'/>
<id>urn:sha1:df4a3b7270539843ae76275485ca76efcdf361d9</id>
<content type='text'>
use O_NOFOLLOW to open the existing lock file, so symbolic links
aren't followed, thus avoid revealing if it point to an existing
file.
</content>
</entry>
<entry>
<title>Unbrand NX Agent Startup Screen / Brand X2Go Agent Startup Screen (999_nxagent_unbrand-nxagent-brand-x2goagent.full.patch).</title>
<updated>2015-02-13T12:57:39+00:00</updated>
<author>
<name>Oleksandr Shneyder</name>
<email>oleksandr.shneyder@obviously-nice.de</email>
</author>
<published>2015-02-13T12:57:39+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=1fd8551f1632efbc2655c9293087bba08cf2f0c9'/>
<id>urn:sha1:1fd8551f1632efbc2655c9293087bba08cf2f0c9</id>
<content type='text'>
  When launched with NX Agent flavour, the startup screen gets unbranded by
  this patch (the !M logo does not get shown).

  When launched with X2Go Agent flavour, the startup screen gets branded
  with the X2GO logo.
</content>
</entry>
<entry>
<title>Be compliant with POS36-C: Observe correct revocation order while relinquishing privileges (602_nx-X11_initgroups.full.patch).</title>
<updated>2015-02-13T12:32:17+00:00</updated>
<author>
<name>Orion Poplawski</name>
<email>orion@cora.nwra.com</email>
</author>
<published>2015-02-13T12:32:17+00:00</published>
<link rel='alternate' type='text/html' href='https://cgit.arctica-project.org/nx-libs/commit/?id=415b20b6fbf562d4132fca90a00b6c32d94040ed'/>
<id>urn:sha1:415b20b6fbf562d4132fca90a00b6c32d94040ed</id>
<content type='text'>
  The Fedora review of NX (redistributed) caught the following rpmlint issue:

  This executable is calling setuid and setgid without setgroups or initgroups.
  There is a high probability this mean it didn't relinquish all groups, and this
  would be a potential security issue to be fixed. Seek POS36-C on the web for
  details about the problem.

  Ref POS36-C:
  https://www.securecoding.cert.org/confluence/display/seccode/POS36-C.+Observe+correct+revocation+order+while+relinquishing+privileges

  This patch adds initgroups() calls to the code to initialize the supplemental group list.
</content>
</entry>
</feed>
