History log of /xsrc/external/mit/libXfont/dist/src/fontfile/
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
f262af57 29-Nov-2017 mrg <mrg@NetBSD.org>

merge libXcursor 1.1.15, libXfont 1.5.4 and libXfont2 2.0.3.

a97c3f35 29-Nov-2017 mrg <mrg@NetBSD.org>

initial import of libXfont-1.5.4. this fixes CVE-2017-16611.

b43acbb4 05-Mar-2017 mrg <mrg@NetBSD.org>

initial import of libXfont-1.5.2

121a5469 17-Mar-2015 mrg <mrg@NetBSD.org>

initial import of libXfont-1.5.1

0b332824 25-Feb-2015 snj <snj@NetBSD.org>

merge libXfont-1.5.0

0145ab54 25-Feb-2015 snj <snj@NetBSD.org>

initial import of libXfont-1.5.0

c2843da4 18-Sep-2014 christos <christos@NetBSD.org>

Set close-on-exec for font file i/o.

7673729a 11-Jul-2014 mrg <mrg@NetBSD.org>

merge libXfont 1.4.8.

61b3db43 11-Jul-2014 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.8

9d21a897 13-May-2014 spz <spz@NetBSD.org>

Fix multiple vulnerabilities in libXfont:

- CVE-2014-0209: integer overflow of allocations in font metadata file parsing

When a local user who is already authenticated to the X server adds
a new directory to the font path, the X server calls libXfont to open
the fonts.dir and fonts.alias files in that directory and add entries
to the font tables for every line in it. A large file (~2-4 gb) could
cause the allocations to overflow, and allow the remaining data read
from the file to overwrite other memory in the heap.

Affected functions: FontFileAddEntry(), lexAlias()

- CVE-2014-0210: unvalidated length fields when parsing xfs protocol replies

When parsing replies received from the font server, these calls do not
check that the lengths and/or indexes returned by the font server are
within the size of the reply or the bounds of the memory allocated to
store the data, so could write past the bounds of allocated memory when
storing the returned data.

Affected functions: _fs_recv_conn_setup(), fs_read_open_font(),
fs_read_query_info(), fs_read_extent_info(), fs_read_glyphs(),
fs_read_list(), fs_read_list_info()

- CVE-2014-0211: integer overflows calculating memory needs for xfs replies

These calls do not check that their calculations for how much memory
is needed to handle the returned data have not overflowed, so can

result in allocating too little memory and then writing the returned
data past the end of the allocated buffer.

Affected functions: fs_get_reply(), fs_alloc_glyphs(),
fs_read_extent_info()

See also: http://lists.x.org/archives/xorg-announce/2014-May/002431.html

b020570b 16-Mar-2014 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.7

1a17810d 31-May-2013 mrg <mrg@NetBSD.org>

merge libXfont 1.4.5

41c30155 31-May-2013 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.5

94917da6 16-Aug-2011 joerg <joerg@NetBSD.org>

Do proper input validation. Allow decompressing all input streams.

334b8e15 15-Aug-2011 christos <christos@NetBSD.org>

P
Fix CVS-2011-2895, buffer overflow in decompress

089493af 14-Aug-2010 mrg <mrg@NetBSD.org>

merge libXfont 1.4.2.

5a3d36df 14-Aug-2010 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.2

b3062210 09-Nov-2009 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.1

449257be 10-Jun-2009 mrg <mrg@NetBSD.org>

apply some HAVE_CONFIG_H

01f4d11f 10-Jun-2009 mrg <mrg@NetBSD.org>

merge libXfont 1.4.0

7f7f5e4e 10-Jun-2009 mrg <mrg@NetBSD.org>

initial import of libXfont-1.4.0

23a0898a 30-Jul-2008 mrg <mrg@NetBSD.org>

initial import of libXfont-1.3.2