All of lore.kernel.org
 help / color / mirror / Atom feed
From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][kirkstone 12/32] xserver-xorg: upgrade 21.1.4 -> 21.1.6
Date: Sun, 22 Jan 2023 16:21:06 -1000	[thread overview]
Message-ID: <9a0efa7ecc55b3f81be20ddc34c14c81ebea7634.1674440376.git.steve@sakoman.com> (raw)
In-Reply-To: <cover.1674440376.git.steve@sakoman.com>

From: Alexander Kanavin <alex.kanavin@gmail.com>

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 009e8d6a292690a0c355d12be2368a9677c701f5)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
 ...possible-memleaks-in-XkbGetKbdByName.patch | 63 -------------------
 ...ntedString-against-request-length-at.patch | 38 -----------
 ...-xorg_21.1.4.bb => xserver-xorg_21.1.6.bb} |  4 +-
 3 files changed, 1 insertion(+), 104 deletions(-)
 delete mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
 delete mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-proof-GetCountedString-against-request-length-at.patch
 rename meta/recipes-graphics/xorg-xserver/{xserver-xorg_21.1.4.bb => xserver-xorg_21.1.6.bb} (80%)

diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
deleted file mode 100644
index 0e61ec5953..0000000000
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
+++ /dev/null
@@ -1,63 +0,0 @@
-CVE: CVE-2022-3551
-Upstream-Status: Backport
-Signed-off-by: Ross Burton <ross.burton@arm.com>
-
-From 18f91b950e22c2a342a4fbc55e9ddf7534a707d2 Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter.hutterer@who-t.net>
-Date: Wed, 13 Jul 2022 11:23:09 +1000
-Subject: [PATCH] xkb: fix some possible memleaks in XkbGetKbdByName
-
-GetComponentByName returns an allocated string, so let's free that if we
-fail somewhere.
-
-Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
----
- xkb/xkb.c | 26 ++++++++++++++++++++------
- 1 file changed, 20 insertions(+), 6 deletions(-)
-
-diff --git a/xkb/xkb.c b/xkb/xkb.c
-index 4692895db..b79a269e3 100644
---- a/xkb/xkb.c
-+++ b/xkb/xkb.c
-@@ -5935,18 +5935,32 @@ ProcXkbGetKbdByName(ClientPtr client)
-     xkb = dev->key->xkbInfo->desc;
-     status = Success;
-     str = (unsigned char *) &stuff[1];
--    if (GetComponentSpec(&str, TRUE, &status))  /* keymap, unsupported */
--        return BadMatch;
-+    {
-+        char *keymap = GetComponentSpec(&str, TRUE, &status);  /* keymap, unsupported */
-+        if (keymap) {
-+            free(keymap);
-+            return BadMatch;
-+        }
-+    }
-     names.keycodes = GetComponentSpec(&str, TRUE, &status);
-     names.types = GetComponentSpec(&str, TRUE, &status);
-     names.compat = GetComponentSpec(&str, TRUE, &status);
-     names.symbols = GetComponentSpec(&str, TRUE, &status);
-     names.geometry = GetComponentSpec(&str, TRUE, &status);
--    if (status != Success)
-+    if (status == Success) {
-+        len = str - ((unsigned char *) stuff);
-+        if ((XkbPaddedSize(len) / 4) != stuff->length)
-+            status = BadLength;
-+    }
-+
-+    if (status != Success) {
-+        free(names.keycodes);
-+        free(names.types);
-+        free(names.compat);
-+        free(names.symbols);
-+        free(names.geometry);
-         return status;
--    len = str - ((unsigned char *) stuff);
--    if ((XkbPaddedSize(len) / 4) != stuff->length)
--        return BadLength;
-+    }
- 
-     CHK_MASK_LEGAL(0x01, stuff->want, XkbGBN_AllComponentsMask);
-     CHK_MASK_LEGAL(0x02, stuff->need, XkbGBN_AllComponentsMask);
--- 
-2.34.1
-
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-proof-GetCountedString-against-request-length-at.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-proof-GetCountedString-against-request-length-at.patch
deleted file mode 100644
index 6f862e82f9..0000000000
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-xkb-proof-GetCountedString-against-request-length-at.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-CVE: CVE-2022-3550
-Upstream-Status: Backport
-Signed-off-by: Ross Burton <ross.burton@arm.com>
-
-From 11beef0b7f1ed290348e45618e5fa0d2bffcb72e Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter.hutterer@who-t.net>
-Date: Tue, 5 Jul 2022 12:06:20 +1000
-Subject: [PATCH] xkb: proof GetCountedString against request length attacks
-
-GetCountedString did a check for the whole string to be within the
-request buffer but not for the initial 2 bytes that contain the length
-field. A swapped client could send a malformed request to trigger a
-swaps() on those bytes, writing into random memory.
-
-Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
----
- xkb/xkb.c | 5 +++++
- 1 file changed, 5 insertions(+)
-
-diff --git a/xkb/xkb.c b/xkb/xkb.c
-index f42f59ef3..1841cff26 100644
---- a/xkb/xkb.c
-+++ b/xkb/xkb.c
-@@ -5137,6 +5137,11 @@ _GetCountedString(char **wire_inout, ClientPtr client, char **str)
-     CARD16 len;
- 
-     wire = *wire_inout;
-+
-+    if (client->req_len <
-+        bytes_to_int32(wire + 2 - (char *) client->requestBuffer))
-+        return BadValue;
-+
-     len = *(CARD16 *) wire;
-     if (client->swapped) {
-         swaps(&len);
--- 
-2.34.1
-
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.4.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.6.bb
similarity index 80%
rename from meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.4.bb
rename to meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.6.bb
index aba09afec3..256903ce5f 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.4.bb
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.6.bb
@@ -2,10 +2,8 @@ require xserver-xorg.inc
 
 SRC_URI += "file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \
            file://0001-Avoid-duplicate-definitions-of-IOPortBase.patch \
-           file://0001-xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch \
-           file://0001-xkb-proof-GetCountedString-against-request-length-at.patch \
            "
-SRC_URI[sha256sum] = "5cc4be8ee47edb58d4a90e603a59d56b40291ad38371b0bd2471fc3cbee1c587"
+SRC_URI[sha256sum] = "1eb86ed674d042b6c8b1f9135e59395cbbca35ed551b122f73a7d8bb3bb22484"
 
 # These extensions are now integrated into the server, so declare the migration
 # path for in-place upgrades.
-- 
2.25.1



  parent reply	other threads:[~2023-01-23  2:22 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-23  2:20 [OE-core][kirkstone 00/32] Patch review Steve Sakoman
2023-01-23  2:20 ` [OE-core][kirkstone 01/32] go: fix CVE-2022-41717 Excessive memory use in got server Steve Sakoman
2023-01-23  2:20 ` [OE-core][kirkstone 02/32] ffmpeg: fix for CVE-2022-3341 Steve Sakoman
2023-01-23  2:20 ` [OE-core][kirkstone 03/32] cve-update-db-native: avoid incomplete updates Steve Sakoman
2023-01-23  2:20 ` [OE-core][kirkstone 04/32] cve-update-db-native: show IP on failure Steve Sakoman
2023-01-23  2:20 ` [OE-core][kirkstone 05/32] cve-check: write the cve manifest to IMGDEPLOYDIR Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 06/32] cairo: fix CVE patches assigned wrong CVE number Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 07/32] lttng-modules: update 2.13.7 -> 2.13.8 Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 08/32] Revert "libksba: fix CVE-2022-47629" Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 09/32] libksba: update 1.6.2 -> 1.6.3 Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 10/32] linux-firmware: upgrade 20221109 -> 20221214 Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 11/32] xwayland: upgrade 22.1.5 -> 22.1.7 Steve Sakoman
2023-01-23  2:21 ` Steve Sakoman [this message]
2023-01-23  2:21 ` [OE-core][kirkstone 13/32] linux-yocto/5.15: ltp and squashfs fixes Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 14/32] linux-yocto/5.15: fix perf build with clang Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 15/32] linux-yocto/5.15: libbpf: Fix build warning on ref_ctr_off Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 16/32] linux-yocto/5.15: update to v5.15.84 Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 17/32] linux-yocto/5.15: powerpc: Fix reschedule bug in KUAP-unlocked user copy Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 18/32] vim: upgrade 9.0.0947 -> 9.0.1211 Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 19/32] gcc: Refactor linker patches and fix linker on arm with usrmerge Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 20/32] classes: image: Set empty weak default IMAGE_LINGUAS Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 21/32] busybox: always start do_compile with orig config files Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 22/32] busybox: rm temporary files if do_compile was interrupted Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 23/32] kernel-fitimage: Adjust order of dtb/dtbo files Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 24/32] kernel-fitimage: Allow user to select dtb when multiple dtb exists Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 25/32] tiff: Add packageconfig knob for webp Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 26/32] harfbuzz: remove bindir only if it exists Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 27/32] dhcpcd: backport two patches to fix runtime error Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 28/32] libseccomp: fix typo in DESCRIPTION Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 29/32] toolchain-scripts: compatibility with unbound variable protection Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 30/32] at: Change when files are copied Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 31/32] lib/oe/reproducible: Use git log without gpg signature Steve Sakoman
2023-01-23  2:21 ` [OE-core][kirkstone 32/32] selftest/virgl: use pkg-config from the host Steve Sakoman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9a0efa7ecc55b3f81be20ddc34c14c81ebea7634.1674440376.git.steve@sakoman.com \
    --to=steve@sakoman.com \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.