--- - branch: pkgsrc-2020Q2 date: Sat Aug 1 06:47:52 UTC 2020 files: - new: 1.51.4.1 old: '1.51' path: pkgsrc/x11/libX11/Makefile pathrev: pkgsrc/x11/libX11/Makefile@1.51.4.1 type: modified - new: 1.30.6.1 old: '1.30' path: pkgsrc/x11/libX11/distinfo pathrev: pkgsrc/x11/libX11/distinfo@1.30.6.1 type: modified id: 20200801T064752Z.733069ad7b2ebcefdf2396f9a7147aa23341302e log: "Pullup ticket #6290 - requested by maya\nx11/libX11: security fix\n\nRevisions pulled up:\n- x11/libX11/Makefile 1.52\n- x11/libX11/distinfo 1.31\n\n---\n Module Name:\tpkgsrc\n Committed By:\tmaya\n Date:\t\tFri Jul 31 16:36:55 UTC 2020\n\n \ Modified Files:\n \tpkgsrc/x11/libX11: Makefile distinfo\n\n Log Message:\n \ libX11: update to 1.6.10\n\n Heap corruption in the X input method client in libX11\n ======================================================\n\n CVE-2020-14344\n\n \ The X Input Method (XIM) client implementation in libX11 has some\n integer overflows and signed/unsigned comparison issues that can lead\n to heap corruption when handling malformed messages from an input\n method.\n\n Patches\n =======\n\n \ Patches for these issues have been commited to the libX11 git repository.\n \ libX11 1.6.10 will be released shortly and will include those patches.\n\n \ https://gitlab.freedesktop.org/xorg/lib/libx11\n\n commit 1703b9f3435079d3c6021e1ee2ec34fd4978103d (HEAD -> master)\n\n Change the data_len parameter of _XimAttributeToValue() to CARD16\n\n It's coming from a length in the protocol (unsigned) and passed\n \ to functions that expect unsigned int parameters (_XCopyToArg()\n and memcpy()).\n\n commit 1a566c9e00e5f35c1f9e7f3d741a02e5170852b2\n\n Zero out buffers in functions\n\n It looks like uninitialized stack or heap memory can leak\n out via padding bytes.\n\n commit 2fcfcc49f3b1be854bb9085993a01d17c62acf60\n\n \ Fix more unchecked lengths\n\n commit 388b303c62aa35a245f1704211a023440ad2c488\n\n \ fix integer overflows in _XimAttributeToValue()\n\n commit 0e6561efcfaa0ae7b5c74eac7e064b76d687544e\n\n \ Fix signed length values in _XimGetAttributeID()\n\n The lengths are unsigned according to the specification. Passing\n negative values can lead to data corruption.\n\n Thanks\n ======\n\n X.Org thanks Todd Carson for reporting these issues to our security\n team and assisting them in understanding them and providing fixes.\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2020Q2] pkgsrc/x11/libX11' unixtime: '1596264472' user: bsiegert