!27 fix CVE-2024-0229 CVE-2024-31083
From: @cenhuilin Reviewed-by: @weidongkl Signed-off-by: @weidongkl
This commit is contained in:
commit
4f1304f878
83
0008-fix-CVE-2024-0229-1.patch
Normal file
83
0008-fix-CVE-2024-0229-1.patch
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
From ece23be888a93b741aa1209d1dbf64636109d6a5 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Wed, 8 May 2024 17:16:41 +0800
|
||||||
|
Subject: [PATCH] dix: Allocate sufficient xEvents for our DeviceStateNotify.
|
||||||
|
|
||||||
|
If a device has both a button class and a key class and numButtons is
|
||||||
|
zero, we can get an OOB write due to event under-allocation.
|
||||||
|
|
||||||
|
This function seems to assume a device has either keys or buttons, not
|
||||||
|
both. It has two virtually identical code paths, both of which assume
|
||||||
|
they're applying to the first event in the sequence.
|
||||||
|
|
||||||
|
A device with both a key and button class triggered a logic bug - only
|
||||||
|
one xEvent was allocated but the deviceStateNotify pointer was pushed on
|
||||||
|
once per type. So effectively this logic code:
|
||||||
|
|
||||||
|
int count = 1;
|
||||||
|
if (button && nbuttons > 32) count++;
|
||||||
|
if (key && nbuttons > 0) count++;
|
||||||
|
if (key && nkeys > 32) count++; // this is basically always true
|
||||||
|
// count is at 2 for our keys + zero button device
|
||||||
|
|
||||||
|
ev = alloc(count * sizeof(xEvent));
|
||||||
|
FixDeviceStateNotify(ev);
|
||||||
|
if (button)
|
||||||
|
FixDeviceStateNotify(ev++);
|
||||||
|
if (key)
|
||||||
|
FixDeviceStateNotify(ev++); // santa drops into the wrong chimney here
|
||||||
|
|
||||||
|
If the device has more than 3 valuators, the OOB is pushed back - we're
|
||||||
|
off by one so it will happen when the last deviceValuator event is
|
||||||
|
written instead.
|
||||||
|
|
||||||
|
Fix this by allocating the maximum number of events we may allocate.
|
||||||
|
Note that the current behavior is not protocol-correct anyway, this
|
||||||
|
patch fixes only the allocation issue.
|
||||||
|
|
||||||
|
Note that this issue does not trigger if the device has at least one
|
||||||
|
button. While the server does not prevent a button class with zero
|
||||||
|
buttons, it is very unlikely.
|
||||||
|
|
||||||
|
CVE-2024-0229, ZDI-CAN-22678
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
---
|
||||||
|
dix/enterleave.c | 6 +++---
|
||||||
|
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/dix/enterleave.c b/dix/enterleave.c
|
||||||
|
index 766f5c8..c4098c9 100644
|
||||||
|
--- a/dix/enterleave.c
|
||||||
|
+++ b/dix/enterleave.c
|
||||||
|
@@ -675,7 +675,8 @@ static void
|
||||||
|
DeliverStateNotifyEvent(DeviceIntPtr dev, WindowPtr win)
|
||||||
|
{
|
||||||
|
int evcount = 1;
|
||||||
|
- deviceStateNotify *ev, *sev;
|
||||||
|
+ deviceStateNotify sev[6 + (MAX_VALUATORS + 2)/3];
|
||||||
|
+ deviceStateNotify *ev;
|
||||||
|
deviceKeyStateNotify *kev;
|
||||||
|
deviceButtonStateNotify *bev;
|
||||||
|
|
||||||
|
@@ -714,7 +715,7 @@ DeliverStateNotifyEvent(DeviceIntPtr dev, WindowPtr win)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
- sev = ev = xallocarray(evcount, sizeof(xEvent));
|
||||||
|
+ ev = sev;
|
||||||
|
FixDeviceStateNotify(dev, ev, NULL, NULL, NULL, first);
|
||||||
|
|
||||||
|
if (b != NULL) {
|
||||||
|
@@ -770,7 +771,6 @@ DeliverStateNotifyEvent(DeviceIntPtr dev, WindowPtr win)
|
||||||
|
|
||||||
|
DeliverEventsToWindow(dev, win, (xEvent *) sev, evcount,
|
||||||
|
DeviceStateNotifyMask, NullGrab);
|
||||||
|
- free(sev);
|
||||||
|
}
|
||||||
|
|
||||||
|
void
|
||||||
|
--
|
||||||
|
2.33.0
|
||||||
|
|
||||||
217
0009-fix-CVE-2024-0229-2.patch
Normal file
217
0009-fix-CVE-2024-0229-2.patch
Normal file
@ -0,0 +1,217 @@
|
|||||||
|
From 219c54b8a3337456ce5270ded6a67bcde53553d5 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Wed, 8 May 2024 17:23:55 +0800
|
||||||
|
Subject: [PATCH] dix: fix DeviceStateNotify event calculation.
|
||||||
|
|
||||||
|
The previous code only made sense if one considers buttons and keys to
|
||||||
|
be mutually exclusive on a device. That is not necessarily true, causing
|
||||||
|
a number of issues.
|
||||||
|
|
||||||
|
This function allocates and fills in the number of xEvents we need to
|
||||||
|
send the device state down the wire. This is split across multiple
|
||||||
|
32-byte devices including one deviceStateNotify event and optional
|
||||||
|
deviceKeyStateNotify, deviceButtonStateNotify and (possibly multiple)
|
||||||
|
deviceValuator events.
|
||||||
|
|
||||||
|
The previous behavior would instead compose a sequence
|
||||||
|
of [state, buttonstate, state, keystate, valuator...]. This is not
|
||||||
|
protocol correct, and on top of that made the code extremely convoluted.
|
||||||
|
|
||||||
|
Fix this by streamlining: add both button and key into the deviceStateNotify
|
||||||
|
and then append the key state and button state, followed by the
|
||||||
|
valuators. Finally, the deviceValuator events contain up to 6 valuators
|
||||||
|
per event but we only ever sent through 3 at a time. Let's double that
|
||||||
|
troughput.
|
||||||
|
|
||||||
|
CVE-2024-0229, ZDI-CAN-22678
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
---
|
||||||
|
dix/enterleave.c | 121 ++++++++++++++++++++---------------------------
|
||||||
|
1 file changed, 52 insertions(+), 69 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/dix/enterleave.c b/dix/enterleave.c
|
||||||
|
index c4098c9..8134814 100644
|
||||||
|
--- a/dix/enterleave.c
|
||||||
|
+++ b/dix/enterleave.c
|
||||||
|
@@ -615,9 +615,15 @@ FixDeviceValuator(DeviceIntPtr dev, deviceValuator * ev, ValuatorClassPtr v,
|
||||||
|
|
||||||
|
ev->type = DeviceValuator;
|
||||||
|
ev->deviceid = dev->id;
|
||||||
|
- ev->num_valuators = nval < 3 ? nval : 3;
|
||||||
|
+ ev->num_valuators = nval < 6 ? nval : 6;
|
||||||
|
ev->first_valuator = first;
|
||||||
|
switch (ev->num_valuators) {
|
||||||
|
+ case 6:
|
||||||
|
+ ev->valuator2 = v->axisVal[first + 5];
|
||||||
|
+ case 5:
|
||||||
|
+ ev->valuator2 = v->axisVal[first + 4];
|
||||||
|
+ case 4:
|
||||||
|
+ ev->valuator2 = v->axisVal[first + 3];
|
||||||
|
case 3:
|
||||||
|
ev->valuator2 = v->axisVal[first + 2];
|
||||||
|
case 2:
|
||||||
|
@@ -626,7 +632,6 @@ FixDeviceValuator(DeviceIntPtr dev, deviceValuator * ev, ValuatorClassPtr v,
|
||||||
|
ev->valuator0 = v->axisVal[first];
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
- first += ev->num_valuators;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
@@ -646,7 +651,7 @@ FixDeviceStateNotify(DeviceIntPtr dev, deviceStateNotify * ev, KeyClassPtr k,
|
||||||
|
ev->num_buttons = b->numButtons;
|
||||||
|
memcpy((char *) ev->buttons, (char *) b->down, 4);
|
||||||
|
}
|
||||||
|
- else if (k) {
|
||||||
|
+ if (k) {
|
||||||
|
ev->classes_reported |= (1 << KeyClass);
|
||||||
|
ev->num_keys = k->xkbInfo->desc->max_key_code -
|
||||||
|
k->xkbInfo->desc->min_key_code;
|
||||||
|
@@ -670,15 +675,26 @@ FixDeviceStateNotify(DeviceIntPtr dev, deviceStateNotify * ev, KeyClassPtr k,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
-
|
||||||
|
+/**
|
||||||
|
+ * The device state notify event is split across multiple 32-byte events.
|
||||||
|
+ * The first one contains the first 32 button state bits, the first 32
|
||||||
|
+ * key state bits, and the first 3 valuator values.
|
||||||
|
+ *
|
||||||
|
+ * If a device has more than that, the server sends out:
|
||||||
|
+ * - one deviceButtonStateNotify for buttons 32 and above
|
||||||
|
+ * - one deviceKeyStateNotify for keys 32 and above
|
||||||
|
+ * - one deviceValuator event per 6 valuators above valuator 4
|
||||||
|
+ *
|
||||||
|
+ * All events but the last one have the deviceid binary ORed with MORE_EVENTS,
|
||||||
|
+ */
|
||||||
|
static void
|
||||||
|
DeliverStateNotifyEvent(DeviceIntPtr dev, WindowPtr win)
|
||||||
|
{
|
||||||
|
+ /* deviceStateNotify, deviceKeyStateNotify, deviceButtonStateNotify
|
||||||
|
+ * and one deviceValuator for each 6 valuators */
|
||||||
|
+ deviceStateNotify sev[3 + (MAX_VALUATORS + 6)/6];
|
||||||
|
int evcount = 1;
|
||||||
|
- deviceStateNotify sev[6 + (MAX_VALUATORS + 2)/3];
|
||||||
|
- deviceStateNotify *ev;
|
||||||
|
- deviceKeyStateNotify *kev;
|
||||||
|
- deviceButtonStateNotify *bev;
|
||||||
|
+ deviceStateNotify *ev = sev;
|
||||||
|
|
||||||
|
KeyClassPtr k;
|
||||||
|
ButtonClassPtr b;
|
||||||
|
@@ -691,82 +707,49 @@ DeliverStateNotifyEvent(DeviceIntPtr dev, WindowPtr win)
|
||||||
|
|
||||||
|
if ((b = dev->button) != NULL) {
|
||||||
|
nbuttons = b->numButtons;
|
||||||
|
- if (nbuttons > 32)
|
||||||
|
+ if (nbuttons > 32) /* first 32 are encoded in deviceStateNotify */
|
||||||
|
evcount++;
|
||||||
|
}
|
||||||
|
if ((k = dev->key) != NULL) {
|
||||||
|
nkeys = k->xkbInfo->desc->max_key_code - k->xkbInfo->desc->min_key_code;
|
||||||
|
- if (nkeys > 32)
|
||||||
|
+ if (nkeys > 32) /* first 32 are encoded in deviceStateNotify */
|
||||||
|
evcount++;
|
||||||
|
- if (nbuttons > 0) {
|
||||||
|
- evcount++;
|
||||||
|
- }
|
||||||
|
}
|
||||||
|
if ((v = dev->valuator) != NULL) {
|
||||||
|
nval = v->numAxes;
|
||||||
|
-
|
||||||
|
- if (nval > 3)
|
||||||
|
- evcount++;
|
||||||
|
- if (nval > 6) {
|
||||||
|
- if (!(k && b))
|
||||||
|
- evcount++;
|
||||||
|
- if (nval > 9)
|
||||||
|
- evcount += ((nval - 7) / 3);
|
||||||
|
- }
|
||||||
|
+ /* first three are encoded in deviceStateNotify, then
|
||||||
|
+ * it's 6 per deviceValuator event */
|
||||||
|
+ evcount += ((nval - 3) + 6)/6;
|
||||||
|
}
|
||||||
|
|
||||||
|
- ev = sev;
|
||||||
|
- FixDeviceStateNotify(dev, ev, NULL, NULL, NULL, first);
|
||||||
|
-
|
||||||
|
- if (b != NULL) {
|
||||||
|
- FixDeviceStateNotify(dev, ev++, NULL, b, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- if (nbuttons > 32) {
|
||||||
|
- (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
- bev = (deviceButtonStateNotify *) ev++;
|
||||||
|
- bev->type = DeviceButtonStateNotify;
|
||||||
|
- bev->deviceid = dev->id;
|
||||||
|
- memcpy((char *) &bev->buttons[4], (char *) &b->down[4],
|
||||||
|
- DOWN_LENGTH - 4);
|
||||||
|
- }
|
||||||
|
- if (nval > 0) {
|
||||||
|
- (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
- FixDeviceValuator(dev, (deviceValuator *) ev++, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- }
|
||||||
|
+ BUG_RETURN(evcount <= ARRAY_SIZE(sev));
|
||||||
|
+
|
||||||
|
+ FixDeviceStateNotify(dev, ev, k, b, v, first);
|
||||||
|
+
|
||||||
|
+ if (b != NULL && nbuttons > 32) {
|
||||||
|
+ deviceButtonStateNotify *bev = (deviceButtonStateNotify *) ++ev;
|
||||||
|
+ (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
+ bev->type = DeviceButtonStateNotify;
|
||||||
|
+ bev->deviceid = dev->id;
|
||||||
|
+ memcpy((char *) &bev->buttons[4], (char *) &b->down[4],
|
||||||
|
+ DOWN_LENGTH - 4);
|
||||||
|
}
|
||||||
|
|
||||||
|
- if (k != NULL) {
|
||||||
|
- FixDeviceStateNotify(dev, ev++, k, NULL, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- if (nkeys > 32) {
|
||||||
|
- (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
- kev = (deviceKeyStateNotify *) ev++;
|
||||||
|
- kev->type = DeviceKeyStateNotify;
|
||||||
|
- kev->deviceid = dev->id;
|
||||||
|
- memmove((char *) &kev->keys[0], (char *) &k->down[4], 28);
|
||||||
|
- }
|
||||||
|
- if (nval > 0) {
|
||||||
|
- (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
- FixDeviceValuator(dev, (deviceValuator *) ev++, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- }
|
||||||
|
+ if (k != NULL && nkeys > 32) {
|
||||||
|
+ deviceKeyStateNotify *kev = (deviceKeyStateNotify *) ++ev;
|
||||||
|
+ (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
+ kev->type = DeviceKeyStateNotify;
|
||||||
|
+ kev->deviceid = dev->id;
|
||||||
|
+ memmove((char *) &kev->keys[0], (char *) &k->down[4], 28);
|
||||||
|
}
|
||||||
|
|
||||||
|
+ first = 3;
|
||||||
|
+ nval -= 3;
|
||||||
|
while (nval > 0) {
|
||||||
|
- FixDeviceStateNotify(dev, ev++, NULL, NULL, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- if (nval > 0) {
|
||||||
|
- (ev - 1)->deviceid |= MORE_EVENTS;
|
||||||
|
- FixDeviceValuator(dev, (deviceValuator *) ev++, v, first);
|
||||||
|
- first += 3;
|
||||||
|
- nval -= 3;
|
||||||
|
- }
|
||||||
|
+ ev->deviceid |= MORE_EVENTS;
|
||||||
|
+ FixDeviceValuator(dev, (deviceValuator *) ++ev, v, first);
|
||||||
|
+ first += 6;
|
||||||
|
+ nval -= 6;
|
||||||
|
}
|
||||||
|
|
||||||
|
DeliverEventsToWindow(dev, win, (xEvent *) sev, evcount,
|
||||||
|
--
|
||||||
|
2.33.0
|
||||||
|
|
||||||
36
0010-fix-CVE-2024-0229-3.patch
Normal file
36
0010-fix-CVE-2024-0229-3.patch
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
From df3c65706eb169d5938df0052059f3e0d5981b74 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Wed, 8 May 2024 17:29:20 +0800
|
||||||
|
Subject: [PATCH] Xi: when creating a new ButtonClass, set the number of buttons.
|
||||||
|
|
||||||
|
There's a racy sequence where a master device may copy the button class
|
||||||
|
from the slave, without ever initializing numButtons. This leads to a
|
||||||
|
device with zero buttons but a button class which is invalid.
|
||||||
|
|
||||||
|
Let's copy the numButtons value from the source - by definition if we
|
||||||
|
don't have a button class yet we do not have any other slave devices
|
||||||
|
with more than this number of buttons anyway.
|
||||||
|
|
||||||
|
CVE-2024-0229, ZDI-CAN-22678
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
---
|
||||||
|
Xi/exevents.c | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/Xi/exevents.c b/Xi/exevents.c
|
||||||
|
index d627da3..1701043 100644
|
||||||
|
--- a/Xi/exevents.c
|
||||||
|
+++ b/Xi/exevents.c
|
||||||
|
@@ -605,6 +605,7 @@ DeepCopyPointerClasses(DeviceIntPtr from, DeviceIntPtr to)
|
||||||
|
to->button = calloc(1, sizeof(ButtonClassRec));
|
||||||
|
if (!to->button)
|
||||||
|
FatalError("[Xi] no memory for class shift.\n");
|
||||||
|
+ to->button->numButtons = from->button->numButtons;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
classes->button = NULL;
|
||||||
|
--
|
||||||
|
2.33.0
|
||||||
|
|
||||||
112
0011-fix-CVE-2024-31083.patch
Normal file
112
0011-fix-CVE-2024-31083.patch
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
From bdca6c3d1f5057eeb31609b1280fc93237b00c77 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Wed, 8 May 2024 17:59:20 +0800
|
||||||
|
Subject: [PATCH] render: fix refcounting of glyphs during ProcRenderAddGlyphs.
|
||||||
|
|
||||||
|
Previously, AllocateGlyph would return a new glyph with refcount=0 and a
|
||||||
|
re-used glyph would end up not changing the refcount at all. The
|
||||||
|
resulting glyph_new array would thus have multiple entries pointing to
|
||||||
|
the same non-refcounted glyphs.
|
||||||
|
|
||||||
|
AddGlyph may free a glyph, resulting in a UAF when the same glyph
|
||||||
|
pointer is then later used.
|
||||||
|
|
||||||
|
Fix this by returning a refcount of 1 for a new glyph and always
|
||||||
|
incrementing the refcount for a re-used glyph, followed by dropping that
|
||||||
|
refcount back down again when we're done with it.
|
||||||
|
|
||||||
|
CVE-2024-31083, ZDI-CAN-22880
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
|
||||||
|
Part-of: <https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1463>
|
||||||
|
---
|
||||||
|
render/glyph.c | 5 +++--
|
||||||
|
render/glyphstr.h | 2 ++
|
||||||
|
render/render.c | 15 +++++++++++----
|
||||||
|
3 files changed, 16 insertions(+), 6 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/render/glyph.c b/render/glyph.c
|
||||||
|
index f3ed9cf..d5fc5f3 100644
|
||||||
|
--- a/render/glyph.c
|
||||||
|
+++ b/render/glyph.c
|
||||||
|
@@ -245,10 +245,11 @@ FreeGlyphPicture(GlyphPtr glyph)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
-static void
|
||||||
|
+void
|
||||||
|
FreeGlyph(GlyphPtr glyph, int format)
|
||||||
|
{
|
||||||
|
CheckDuplicates(&globalGlyphs[format], "FreeGlyph");
|
||||||
|
+ BUG_RETURN(glyph->refcnt == 0);
|
||||||
|
if (--glyph->refcnt == 0) {
|
||||||
|
GlyphRefPtr gr;
|
||||||
|
int i;
|
||||||
|
@@ -354,7 +355,7 @@ AllocateGlyph(xGlyphInfo * gi, int fdepth)
|
||||||
|
glyph = (GlyphPtr) malloc(size);
|
||||||
|
if (!glyph)
|
||||||
|
return 0;
|
||||||
|
- glyph->refcnt = 0;
|
||||||
|
+ glyph->refcnt = 1;
|
||||||
|
glyph->size = size + sizeof(xGlyphInfo);
|
||||||
|
glyph->info = *gi;
|
||||||
|
dixInitPrivates(glyph, (char *) glyph + head_size, PRIVATE_GLYPH);
|
||||||
|
diff --git a/render/glyphstr.h b/render/glyphstr.h
|
||||||
|
index 2f51bd2..e803455 100644
|
||||||
|
--- a/render/glyphstr.h
|
||||||
|
+++ b/render/glyphstr.h
|
||||||
|
@@ -109,6 +109,8 @@ extern GlyphPtr FindGlyph(GlyphSetPtr glyphSet, Glyph id);
|
||||||
|
|
||||||
|
extern GlyphPtr AllocateGlyph(xGlyphInfo * gi, int format);
|
||||||
|
|
||||||
|
+extern void FreeGlyph(GlyphPtr glyph, int format);
|
||||||
|
+
|
||||||
|
extern Bool
|
||||||
|
ResizeGlyphSet(GlyphSetPtr glyphSet, CARD32 change);
|
||||||
|
|
||||||
|
diff --git a/render/render.c b/render/render.c
|
||||||
|
index 456f156..5bc2a20 100644
|
||||||
|
--- a/render/render.c
|
||||||
|
+++ b/render/render.c
|
||||||
|
@@ -1076,6 +1076,7 @@ ProcRenderAddGlyphs(ClientPtr client)
|
||||||
|
|
||||||
|
if (glyph_new->glyph && glyph_new->glyph != DeletedGlyph) {
|
||||||
|
glyph_new->found = TRUE;
|
||||||
|
+ ++glyph_new->glyph->refcnt;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
GlyphPtr glyph;
|
||||||
|
@@ -1168,8 +1169,10 @@ ProcRenderAddGlyphs(ClientPtr client)
|
||||||
|
err = BadAlloc;
|
||||||
|
goto bail;
|
||||||
|
}
|
||||||
|
- for (i = 0; i < nglyphs; i++)
|
||||||
|
+ for (i = 0; i < nglyphs; i++) {
|
||||||
|
AddGlyph(glyphSet, glyphs[i].glyph, glyphs[i].id);
|
||||||
|
+ FreeGlyph(glyphs[i].glyph, glyphSet->fdepth);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
if (glyphsBase != glyphsLocal)
|
||||||
|
free(glyphsBase);
|
||||||
|
@@ -1179,9 +1182,13 @@ ProcRenderAddGlyphs(ClientPtr client)
|
||||||
|
FreePicture((void *) pSrc, 0);
|
||||||
|
if (pSrcPix)
|
||||||
|
FreeScratchPixmapHeader(pSrcPix);
|
||||||
|
- for (i = 0; i < nglyphs; i++)
|
||||||
|
- if (glyphs[i].glyph && !glyphs[i].found)
|
||||||
|
- free(glyphs[i].glyph);
|
||||||
|
+ for (i = 0; i < nglyphs; i++) {
|
||||||
|
+ if (glyphs[i].glyph) {
|
||||||
|
+ --glyphs[i].glyph->refcnt;
|
||||||
|
+ if (!glyphs[i].found)
|
||||||
|
+ free(glyphs[i].glyph);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
if (glyphsBase != glyphsLocal)
|
||||||
|
free(glyphsBase);
|
||||||
|
return err;
|
||||||
|
--
|
||||||
|
2.33.0
|
||||||
|
|
||||||
@ -4,7 +4,7 @@
|
|||||||
Summary: Xwayland
|
Summary: Xwayland
|
||||||
Name: xorg-x11-server-Xwayland
|
Name: xorg-x11-server-Xwayland
|
||||||
Version: 22.1.2
|
Version: 22.1.2
|
||||||
Release: 4
|
Release: 5
|
||||||
License: MIT
|
License: MIT
|
||||||
URL: http://www.x.org
|
URL: http://www.x.org
|
||||||
Source0: https://www.x.org/pub/individual/xserver/%{pkgname}-%{version}.tar.xz
|
Source0: https://www.x.org/pub/individual/xserver/%{pkgname}-%{version}.tar.xz
|
||||||
@ -16,6 +16,10 @@ Patch4: 0004-fix-CVE-2023-6478.patch
|
|||||||
Patch5: 0005-fix-CVE-2023-6816.patch
|
Patch5: 0005-fix-CVE-2023-6816.patch
|
||||||
Patch6: 0006-fix-CVE-2024-0408.patch
|
Patch6: 0006-fix-CVE-2024-0408.patch
|
||||||
Patch7: 0007-fix-CVE-2024-0409.patch
|
Patch7: 0007-fix-CVE-2024-0409.patch
|
||||||
|
Patch8: 0008-fix-CVE-2024-0229-1.patch
|
||||||
|
Patch9: 0009-fix-CVE-2024-0229-2.patch
|
||||||
|
Patch10: 0010-fix-CVE-2024-0229-3.patch
|
||||||
|
Patch11: 0011-fix-CVE-2024-31083.patch
|
||||||
|
|
||||||
Requires: xorg-x11-server-common
|
Requires: xorg-x11-server-common
|
||||||
Requires: libEGL
|
Requires: libEGL
|
||||||
@ -116,6 +120,9 @@ rm -Rf $RPM_BUILD_ROOT%{_localstatedir}/lib/xkb
|
|||||||
%{_libdir}/pkgconfig/xwayland.pc
|
%{_libdir}/pkgconfig/xwayland.pc
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed May 08 2024 cenhuilin <cenhuilin@kylinos.cn> - 22.1.2-5
|
||||||
|
- fix CVE-2024-0229 CVE-2024-31083
|
||||||
|
|
||||||
* Mon May 06 2024 cenhuilin <cenhuilin@kylinos.cn> - 22.1.2-4
|
* Mon May 06 2024 cenhuilin <cenhuilin@kylinos.cn> - 22.1.2-4
|
||||||
- fix CVE-2023-6377 CVE-2023-6478 CVE-2023-6816 CVE-2024-0408 CVE-2024-0409
|
- fix CVE-2023-6377 CVE-2023-6478 CVE-2023-6816 CVE-2024-0408 CVE-2024-0409
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user