libXfont/libXfont.changes

164 lines
7.2 KiB
Plaintext

-------------------------------------------------------------------
Tue Nov 28 19:20:44 UTC 2017 - sndirsch@suse.com
- Update to release 1.5.4
* Open files with O_NOFOLLOW. (CVE-2017-16611, bsc#1050459)
-------------------------------------------------------------------
Fri Oct 20 13:56:21 UTC 2017 - sndirsch@suse.com
- Update to release 1.5.3
* Check for end of string in PatternMatch (CVE-2017-13720)
* pcfGetProperties: Check string boundaries (CVE-2017-13722)
-------------------------------------------------------------------
Tue May 30 10:07:46 UTC 2017 - sndirsch@suse.com
- includes everything needed for missing sle issue entries:
fate #320388 (bsc#1041641)
boo#958383, bnc#921978, bnc#857544 (bsc#1041641)
CVE-2015-1802, CVE-2015-1803, CVE-2015-1804 (bsc#1041641)
CVE-2014-0209, CVE-2014-0210, CVE-2014-0211 (bsc#1041641)
-------------------------------------------------------------------
Thu Sep 22 13:07:50 UTC 2016 - sndirsch@suse.com
- Update to release 1.5.2
Maintenance branch release, primarily for bdftopcf's benefit as it's
the only thing that really needs the Xfont1 API. (xfs uses it too, I
believe, but could be ported to Xfont2). If someone wanted to step up
and merge Xfont1 into bdtopcf directly, that'd be great.
- supersedes U_bdfReadCharacters-Allow-negative-DWIDTH-values.patch
-------------------------------------------------------------------
Tue Dec 8 15:57:08 UTC 2015 - eich@suse.com
- U_bdfReadCharacters-Allow-negative-DWIDTH-values.patch
Negative DWIDTH is legal. This was broken by the fix for
CVE-2015-1804. Fixed upstream with commit 1a73d6 (boo#958383).
-------------------------------------------------------------------
Wed Mar 18 09:23:04 UTC 2015 - sndirsch@suse.com
- Update to release 1.5.1
* This release of libXfont provides the fixes for the
security advisory about BDF font parsing bugs (CVE-2015-1802,
CVE-2015-1803, CVE-2015-1804)
-------------------------------------------------------------------
Mon Jul 21 13:56:20 UTC 2014 - sndirsch@suse.com
- Update to final release 1.5.0
* no changes since 1.4.99.901
-------------------------------------------------------------------
Wed Jul 9 12:24:00 UTC 2014 - sndirsch@suse.com
- Update to version 1.4.99.901
* This is a release candidate of libXfont 1.5.0 - please test and
report any issues found, so we can have a final/stable release
soon to go with the xorg-server 1.16 release.
* *IMPORTANT* This release works with fontsproto 2.1.3 or later
and is for use with the upcoming release of xorg-server 1.16
and later. It will *not* work with older versions of
fontsproto or xorg-server (prior to 1.15.99.901).
* This release includes all the security & bug fixes from
libXfont 1.4.8, plus these additional significant changes:
- Support for SNF font format (deprecated since X11R5 in 1991)
is now disabled by default at build time. For now, adding
--enable-snfformat to configure flags may re-enable it, but
support may be fully removed in future libXfont releases.
- Many compiler warnings cleaned up, including some which
required API changes around type declarations (const char *,
Pointer, etc.).
- README file expanded to explain all the different formats/
options.
- supersedes patches:
* U_0001-CVE-2014-0209-integer-overflow-of-realloc-size-in-Fo.patch
* U_0002-CVE-2014-0209-integer-overflow-of-realloc-size-in-le.patch
* U_0003-CVE-2014-0210-unvalidated-length-in-_fs_recv_conn_se.patch
* U_0004-CVE-2014-0210-unvalidated-lengths-when-reading-repli.patch
* U_0005-CVE-2014-0211-Integer-overflow-in-fs_get_reply-_fs_s.patch
* U_0006-CVE-2014-0210-unvalidated-length-fields-in-fs_read_q.patch
* U_0007-CVE-2014-0211-integer-overflow-in-fs_read_extent_inf.patch
* U_0008-CVE-2014-0211-integer-overflow-in-fs_alloc_glyphs.patch
* U_0009-CVE-2014-0210-unvalidated-length-fields-in-fs_read_e.patch
* U_0010-CVE-2014-0210-unvalidated-length-fields-in-fs_read_g.patch
* U_0011-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch
* U_0012-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch
- added baselibs.conf as source to spec file
-------------------------------------------------------------------
Mon May 19 13:33:08 UTC 2014 - msrb@suse.com
- U_0001-CVE-2014-0209-integer-overflow-of-realloc-size-in-Fo.patch,
U_0002-CVE-2014-0209-integer-overflow-of-realloc-size-in-le.patch,
U_0003-CVE-2014-0210-unvalidated-length-in-_fs_recv_conn_se.patch,
U_0004-CVE-2014-0210-unvalidated-lengths-when-reading-repli.patch,
U_0005-CVE-2014-0211-Integer-overflow-in-fs_get_reply-_fs_s.patch,
U_0006-CVE-2014-0210-unvalidated-length-fields-in-fs_read_q.patch,
U_0007-CVE-2014-0211-integer-overflow-in-fs_read_extent_inf.patch,
U_0008-CVE-2014-0211-integer-overflow-in-fs_alloc_glyphs.patch,
U_0009-CVE-2014-0210-unvalidated-length-fields-in-fs_read_e.patch,
U_0010-CVE-2014-0210-unvalidated-length-fields-in-fs_read_g.patch,
U_0011-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch,
U_0012-CVE-2014-0210-unvalidated-length-fields-in-fs_read_l.patch
* Security fixes. (CVE-2014-0209, CVE-2014-0210, CVE-2014-0211,
bnc#857544)
-------------------------------------------------------------------
Tue Mar 18 14:24:59 UTC 2014 - sndirsch@suse.com
- update to current git commit a96cc1f to match current fontsproto
git sources
-------------------------------------------------------------------
Wed Jan 8 09:51:40 UTC 2014 - sndirsch@suse.com
- Update to version 1.4.7
This release includes the fix for CVE-2013-6462, as well as
other security hardening and code cleanups, and makes libXfont
compatible with libXtrans 1.3 on Solaris. (bnc#854915)
-------------------------------------------------------------------
Sat Aug 17 22:04:16 UTC 2013 - zaitor@opensuse.org
- Update to version 1.4.6:
+ Require ANSI C89 pre-processor, drop pre-C89 token pasting
support.
+ Protect config.h inclusion with ifdef HAVE_CONFIG_H, like
usual.
+ Replace deprecated Automake INCLUDES variable with AM_CPPFLAGS.
+ autogen.sh: Implement GNOME Build API.
+ configure: Remove AM_MAINTAINER_MODE.
+ catalogue: Fix obvious thinko.
+ Omit catalogue support on systems without symlinks.
+ If socket is interrupted with signal EINTR, re-attempt read.
-------------------------------------------------------------------
Sun Feb 17 17:21:53 UTC 2013 - jengelh@inai.de
- Use more robust make install call
-------------------------------------------------------------------
Thu Apr 12 06:24:00 UTC 2012 - vuntz@opensuse.org
- Update to version 1.4.5:
+ Updates to better handle fonts compressed with compress(1)
+ Do proper input validation to fix for CVE-2011-2895
+ Fix crash if pcf header is corrupted
+ Cleanups for compiler warnings
+ Improvements for the developer documentation
+ Build configuration improvements
- Changes from version 1.4.4:
+ LZW decompress: fix for CVE-2011-2895
+ Fix memory leak
+ Build configuration improvements
- Drop U_libXfont_LZW-decompress-fix-for-CVE-2011-2895.patch: fixed
upstream.
-------------------------------------------------------------------
Tue Feb 7 22:17:49 UTC 2012 - jengelh@medozas.de
- Split xorg-x11-libs into separate packages