[prev in list] [next in list] [prev in thread] [next in thread] 

List:       freedesktop-xorg
Subject:    [ANNOUNCE] libXi 1.7.1.901
From:       Peter Hutterer <peter.hutterer () who-t ! net>
Date:       2013-06-26 22:53:56
Message-ID: 20130626225356.GA7063 () yabbi ! redhat ! com
[Download RAW message or body]

[Attachment #2 (multipart/signed)]


First and likely only RC for libXi 1.7.2. This one has a bunch of changes
for CVE-2013-1998, CVE-2013-1984 and CVE-2013-1995. These relate to various
integer overflows and other corruption that happens if we trust the server
a bit too much on the data we're being sent.

On top of those fixes, the sequence number in XI2 events is now set
propertly too (#64687).

Please test, if you find any issues let me know.

Alan Coopersmith (14):
      Expand comment on the memory vs. reply ordering in XIGetSelectedEvents()
      Use _XEatDataWords to avoid overflow of rep.length bit shifting
      Stack buffer overflow in XGetDeviceButtonMapping() [CVE-2013-1998 1/3]
      memory corruption in _XIPassiveGrabDevice() [CVE-2013-1998 2/3]
      unvalidated lengths in XQueryDeviceState() [CVE-2013-1998 3/3]
      integer overflow in XGetDeviceControl() [CVE-2013-1984 1/8]
      integer overflow in XGetFeedbackControl() [CVE-2013-1984 2/8]
      integer overflow in XGetDeviceDontPropagateList() [CVE-2013-1984 3/8]
      integer overflow in XGetDeviceMotionEvents() [CVE-2013-1984 4/8]
      integer overflow in XIGetProperty() [CVE-2013-1984 5/8]
      integer overflow in XIGetSelectedEvents() [CVE-2013-1984 6/8]
      Avoid integer overflow in XGetDeviceProperties() [CVE-2013-1984 7/8]
      Avoid integer overflow in XListInputDevices() [CVE-2013-1984 8/8]
      sign extension issue in XListInputDevices() [CVE-2013-1995]

Peter Hutterer (7):
      Copy the sequence number into the target event too (#64687)
      Don't overwrite the cookies serial number
      Fix potential corruption in mask_len handling
      Change size += to size = in XGetDeviceControl
      If the XGetDeviceDontPropagateList reply has an invalid length, return 0
      Include limits.h to prevent build error: missing INT_MAX
      libXi 1.7.1.901

git tag: libXi-1.7.1.901

http://xorg.freedesktop.org/archive/individual/lib/libXi-1.7.1.901.tar.bz2
MD5:  8a775d5368c9fb64aa484fb320b0c82d  libXi-1.7.1.901.tar.bz2
SHA1: 5e77d6ea94bb2efb83a6b9fe0093fea75e38f321  libXi-1.7.1.901.tar.bz2
SHA256: 5248b643fc0b76fff978eefc0acdeee278407983cf7b6e371242e1b53ba32f7c  libXi-1.7.1.901.tar.bz2

http://xorg.freedesktop.org/archive/individual/lib/libXi-1.7.1.901.tar.gz
MD5:  ac83d7276b9d36c9ccd69b7020396e66  libXi-1.7.1.901.tar.gz
SHA1: 9991d3ac73f002f98e0eb416fb725028b9b74e35  libXi-1.7.1.901.tar.gz
SHA256: c5ac9548070545b71d650f37b5fc2fd122f38d4e280729fe30abece2de5b693c  libXi-1.7.1.901.tar.gz


[Attachment #5 (application/pgp-signature)]

_______________________________________________
xorg@lists.x.org: X.Org support
Archives: http://lists.freedesktop.org/archives/xorg
Info: http://lists.x.org/mailman/listinfo/xorg
Your subscription address: freedesktop-xorg@progressive-comp.com

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic