Compare commits

..

109 Commits

Author SHA256 Message Date
1dd0f95fcc Accepting request 1248777 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/1248777
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=41
2025-02-27 13:50:24 +00:00
a3a5ea5a59 Accepting request 1248449 from X11:XOrg
- U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
  U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  * Use-after-free of the root cursor (CVE-2025-26594, bsc#1237427)
- U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  * Buffer overflow in XkbVModMaskText() (CVE-2025-26595, bsc#1237429)
- U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  * Heap overflow in XkbWriteKeySyms() (CVE-2025-26596, bsc#1237430)
- U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  * Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597, bsc#1237431)
- U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  * Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598, bsc#1237432)
- U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  * Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599, bsc#1237433)
- U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  * Use-after-free in PlayReleasedEvents() (CVE-2025-26600, bsc#1237434)
- U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  * Use-after-free in SyncInitTrigger() (CVE-2025-26601, bsc#1237435)

OBS-URL: https://build.opensuse.org/request/show/1248449
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=40
2025-02-26 16:13:41 +00:00
6c10e3edc4 - U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch
U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch
  * Use-after-free of the root cursor (CVE-2025-26594, bsc#1237427)
- U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch
  * Buffer overflow in XkbVModMaskText() (CVE-2025-26595, bsc#1237429)
- U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch
  * Heap overflow in XkbWriteKeySyms() (CVE-2025-26596, bsc#1237430)
- U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch
  * Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597, bsc#1237431)
- U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch
  * Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598, bsc#1237432)
- U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch
  U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch
  * Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599, bsc#1237433)
- U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch
  * Use-after-free in PlayReleasedEvents() (CVE-2025-26600, bsc#1237434)
- U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch
  U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch
  U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch
  U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch
  * Use-after-free in SyncInitTrigger() (CVE-2025-26601, bsc#1237435)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=98
2025-02-25 18:13:24 +00:00
Ana Guerrero
78461b05b0 Accepting request 1243618 from X11:XOrg
- Update to 24.1.5
  * os: NextDPMSTimeout: mark intentional fallthroughs in switch
  * Xi: avoid NULL pointer dereference if GetXTestDevice returns NULL
  * render: avoid NULL pointer dereference if PictureFindVisual returns NULL
  * dix: fix button offset when generating DeviceButtonStateNotify events
  * dix: limit checks to MAX_VALUATORS when generating Xi events
  * dix-config.h: add HAVE_SOCKLEN_T definition
  * xwayland: copy repeat settings from the compositor map
  * xwayland: Don't run key behaviors and actions
  * xwayland/glamor/gbm: Don't close fence_fd after xwl_glamor_wait_fence
  * xwayland/present: Check allow_commits in xwl_present_flip
  * xwayland/glamor: Drop expecting_event bailing from xwl_drm_handle_device
  * xwayland: Always decrement expecting_event in xwl_output_create
  * xwayland/glamor: Clean-up GBM's screen private on failure
  * xwayland: Do not keep the cursor's pixmap around
  * xkb: Always use MAP_LENGTH keymap size
  * os/connection: Make sure partial is initialized
  * xwayland/glamor: Disable GLAMOR after GBM cleanup
  * glamor: return the result of gbm_format_for_depth
  * glamor: use gbm_format_for_depth instead of open-coding it
  * glamor: reject configs using unsupported rgbBits size
  * xwayland: prevent potential null pointer dereference

OBS-URL: https://build.opensuse.org/request/show/1243618
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=39
2025-02-07 21:46:57 +00:00
87cc4ccb4a - Update to 24.1.5
* os: NextDPMSTimeout: mark intentional fallthroughs in switch
  * Xi: avoid NULL pointer dereference if GetXTestDevice returns NULL
  * render: avoid NULL pointer dereference if PictureFindVisual returns NULL
  * dix: fix button offset when generating DeviceButtonStateNotify events
  * dix: limit checks to MAX_VALUATORS when generating Xi events
  * dix-config.h: add HAVE_SOCKLEN_T definition
  * xwayland: copy repeat settings from the compositor map
  * xwayland: Don't run key behaviors and actions
  * xwayland/glamor/gbm: Don't close fence_fd after xwl_glamor_wait_fence
  * xwayland/present: Check allow_commits in xwl_present_flip
  * xwayland/glamor: Drop expecting_event bailing from xwl_drm_handle_device
  * xwayland: Always decrement expecting_event in xwl_output_create
  * xwayland/glamor: Clean-up GBM's screen private on failure
  * xwayland: Do not keep the cursor's pixmap around
  * xkb: Always use MAP_LENGTH keymap size
  * os/connection: Make sure partial is initialized
  * xwayland/glamor: Disable GLAMOR after GBM cleanup
  * glamor: return the result of gbm_format_for_depth
  * glamor: use gbm_format_for_depth instead of open-coding it
  * glamor: reject configs using unsupported rgbBits size
  * xwayland: prevent potential null pointer dereference

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=96
2025-02-06 12:00:25 +00:00
Ana Guerrero
2eb6dcad49 Accepting request 1221608 from X11:XOrg
- Security update 21.1.14
  This release addresses the following security issue
  * CVE-2024-9632: Heap-based buffer overflow privilege escalation
    in _XkbSetCompatMap (bsc#1231565)

OBS-URL: https://build.opensuse.org/request/show/1221608
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=38
2024-11-06 15:49:19 +00:00
e6f2706b47 - Security update 21.1.14
This release addresses the following security issue
  * CVE-2024-9632: Heap-based buffer overflow privilege escalation
    in _XkbSetCompatMap (bsc#1231565)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=94
2024-10-29 19:33:17 +00:00
Ana Guerrero
7970ce6100 Accepting request 1205602 from X11:XOrg
- Update to bugfix release 24.1.3
  * dix: check for calloc() failure in Xi event conversion routines
  * dix: PolyText: fully initialize local_closure
  * dix: SetFontPath: don't set errorValue on Success
  * dix: enterleave.c: fix implicit fallthrough warnings
  * dix: CreateScratchGC: avoid dereference of pointer we just set to NULL
  * dix: InitPredictableAccelerationScheme: avoid memory leak on failure
  * dix: dixChangeWindowProperty: don't call memcpy if malloc failed
  * dix: ProcListProperties: skip unneeded work if numProps is 0
  * dix: HashResourceID: use unsigned integers for bit shifting
  * dix: GetPairedDevice: check if GetMaster returned NULL
  * dix: FindBestPixel: fix implicit fallthrough warning
  * CI: clone libdecor from fd.o instead of gnome.org
  * CI: update libdecor from 0.1.0 to 0.1.1
  * Don't crash if the client argv or argv[0] is NULL.
  * Return NULL in *cmdname if the client argv or argv[0] is NULL
  * xwayland: connect to the wl display before calling into EGL
  * xwayland: Report correct mode size when rootful
  * build: Move epoll dependency check
  * build: Add epoll to Xwayland for DragonFly and OpenBSD
  * build: Fix DRI3 on DragonFly and OpenBSD
  * os: Fix NULL pointer dereference
  * dix: don't push the XKB state to a non-existing master keyboard
  * Xi: when removing a master search for a disabled paired device

OBS-URL: https://build.opensuse.org/request/show/1205602
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=37
2024-10-06 15:51:17 +00:00
978db30820 - Update to bugfix release 24.1.3
* dix: check for calloc() failure in Xi event conversion routines
  * dix: PolyText: fully initialize local_closure
  * dix: SetFontPath: don't set errorValue on Success
  * dix: enterleave.c: fix implicit fallthrough warnings
  * dix: CreateScratchGC: avoid dereference of pointer we just set to NULL
  * dix: InitPredictableAccelerationScheme: avoid memory leak on failure
  * dix: dixChangeWindowProperty: don't call memcpy if malloc failed
  * dix: ProcListProperties: skip unneeded work if numProps is 0
  * dix: HashResourceID: use unsigned integers for bit shifting
  * dix: GetPairedDevice: check if GetMaster returned NULL
  * dix: FindBestPixel: fix implicit fallthrough warning
  * CI: clone libdecor from fd.o instead of gnome.org
  * CI: update libdecor from 0.1.0 to 0.1.1
  * Don't crash if the client argv or argv[0] is NULL.
  * Return NULL in *cmdname if the client argv or argv[0] is NULL
  * xwayland: connect to the wl display before calling into EGL
  * xwayland: Report correct mode size when rootful
  * build: Move epoll dependency check
  * build: Add epoll to Xwayland for DragonFly and OpenBSD
  * build: Fix DRI3 on DragonFly and OpenBSD
  * os: Fix NULL pointer dereference
  * dix: don't push the XKB state to a non-existing master keyboard
  * Xi: when removing a master search for a disabled paired device

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=92
2024-10-03 21:42:39 +00:00
Ana Guerrero
fc377560bf Accepting request 1202923 from X11:XOrg
- added conflicts to patterns-wsl-tmpfiles as this patterns package
  creates a symlink from /tmp/.X11-unix to /mnt/wslg/.X11-unix and
  therefore prevents Xwayland from creating this needed directory
  (bsc#1230755)

OBS-URL: https://build.opensuse.org/request/show/1202923
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=36
2024-09-25 19:52:49 +00:00
7d3a990aeb - added conflicts to patterns-wsl-tmpfiles as this patterns package
creates a symlink from /tmp/.X11-unix to /mnt/wslg/.X11-unix and
  therefore prevents Xwayland from creating this needed directory
  (bsc#1230755)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=90
2024-09-24 11:35:15 +00:00
Ana Guerrero
bfcd1d138a Accepting request 1195855 from X11:XOrg
- Update to bugfix release 24.1.2
  * This release addresses several issues, including the first
    events being skipped with input emulation using libEI or a fix
    with rendering using the UYVY format with the X-Video extension
    using GLAMOR.

OBS-URL: https://build.opensuse.org/request/show/1195855
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=35
2024-08-26 20:05:27 +00:00
97cf98874f - Update to bugfix release 24.1.2
* This release addresses several issues, including the first
    events being skipped with input emulation using libEI or a fix
    with rendering using the UYVY format with the X-Video extension
    using GLAMOR.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=88
2024-08-24 20:22:35 +00:00
Ana Guerrero
3d134d688b Accepting request 1187080 from X11:XOrg
- added version specific requirements for dri3proto, presentproto
  and wayland-protocols

- This supersedes the following patches
  * U_CVE-2024-31080-Xi-ProcXIGetSelectedEvents-needs-to-use-unswapped-le.patch
  * U_CVE-2024-31081-Xi-ProcXIPassiveGrabDevice-needs-to-use-unswapped-le.patch
  * U_CVE-2024-31083-render-fix-refcounting-of-glyphs-during-ProcRenderAd.patch
  * U_render-Avoid-possible-double-free-in-ProcRenderAddGl.patch 
  which fixed security issues 
  * CVE-2024-31080 (bsc#1222309)
  * CVE-2024-31081 (bsc#1222310)
  * CVE-2024-31083 (bsc#1222312)
  and a regression due to a security fix for CVE-2024-31083 (bsc#1222312,
  boo#1222442, gitlab xserver issue #1659)

- Update to bugfix release 24.1.1 for the current stable 24.1
  branch of Xwayland
  * xwayland: fix segment fault in `xwl_glamor_gbm_init_main_dev`
  * os: Explicitly include X11/Xmd.h for CARD32 definition to fix
    building on i686
  * present: On *BSD, epoll-shim is needed to emulate eventfd()
  * xwayland: Stop on first unmapped child
  * xwayland/window-buffers: Promote xwl_window_buffer
  * xwayland/window-buffers: Add xwl_window_buffer_release()
  * xwayland/glamor/gbm: Copy explicit sync code to GLAMOR/GBM
  * xwayland/window-buffers: Use synchronization from GLAMOR/GBM
  * xwayland/window-buffers: Do not always set syncpnts
  * xwayland/window-buffers: Move code to submit pixmaps
  * xwayland/window-buffers: Set syncpnts for all pixmaps
  * xwayland: Move xwl_window disposal to its own function
  * xwayland: Make sure we do not leak xwl_window on destroy
  * wayland/window-buffers: Move buffer disposal to its own function
  * xwayland/window-buffers: optionally force disposal
  * wayland: Force disposal of windows buffers for root on destroy
  * xwayland: Check for pointer in xwl_seat_leave_ptr()
  * xwayland: remove includedir from pkgconfig

OBS-URL: https://build.opensuse.org/request/show/1187080
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=34
2024-07-14 06:49:11 +00:00
72459349da fixed typo in latest changelog
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=86
2024-07-12 13:04:15 +00:00
0347c75e71 - added version specific reqirements for dri3proto, presentproto
and wayland-protocols

- This supersedes the following patches
  * U_CVE-2024-31080-Xi-ProcXIGetSelectedEvents-needs-to-use-unswapped-le.patch
  * U_CVE-2024-31081-Xi-ProcXIPassiveGrabDevice-needs-to-use-unswapped-le.patch
  * U_CVE-2024-31083-render-fix-refcounting-of-glyphs-during-ProcRenderAd.patch
  * U_render-Avoid-possible-double-free-in-ProcRenderAddGl.patch 
  which fixed security issues 
  * CVE-2024-31080 (bsc#1222309)
  * CVE-2024-31081 (bsc#1222310)
  * CVE-2024-31083 (bsc#1222312)
  and a regression due to a security fix for CVE-2024-31083 (bsc#1222312,
  boo#1222442, gitlab xserver issue #1659)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=85
2024-07-11 14:58:48 +00:00
bba0a49d3c - Update to bugfix release 24.1.1 for the current stable 24.1
branch of Xwayland
  * xwayland: fix segment fault in `xwl_glamor_gbm_init_main_dev`
  * os: Explicitly include X11/Xmd.h for CARD32 definition to fix
    building on i686
  * present: On *BSD, epoll-shim is needed to emulate eventfd()
  * xwayland: Stop on first unmapped child
  * xwayland/window-buffers: Promote xwl_window_buffer
  * xwayland/window-buffers: Add xwl_window_buffer_release()
  * xwayland/glamor/gbm: Copy explicit sync code to GLAMOR/GBM
  * xwayland/window-buffers: Use synchronization from GLAMOR/GBM
  * xwayland/window-buffers: Do not always set syncpnts
  * xwayland/window-buffers: Move code to submit pixmaps
  * xwayland/window-buffers: Set syncpnts for all pixmaps
  * xwayland: Move xwl_window disposal to its own function
  * xwayland: Make sure we do not leak xwl_window on destroy
  * wayland/window-buffers: Move buffer disposal to its own function
  * xwayland/window-buffers: optionally force disposal
  * wayland: Force disposal of windows buffers for root on destroy
  * xwayland: Check for pointer in xwl_seat_leave_ptr()
  * xwayland: remove includedir from pkgconfig

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=84
2024-07-11 11:50:33 +00:00
Ana Guerrero
ab36a95bd2 Accepting request 1178726 from X11:XOrg
- disable DPMS on sle15 due to missing proto package

OBS-URL: https://build.opensuse.org/request/show/1178726
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=33
2024-06-06 10:30:37 +00:00
ec8c6e14d2 - disable DPMS on sle15 due to missing proto package
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=82
2024-06-05 11:29:38 +00:00
Ana Guerrero
e4bc58af23 Accepting request 1174287 from X11:XOrg
- Update to feature release 24.1.0
  * This fixes a couple of regressions introduced in the previous release
    candidate versions along with a fix for XTEST emulation with EI.
    + xwayland: Send ei_device_frame on device_scroll_discrete
    + xwayland: Restore the ResizeWindow handler
    + xwayland: Handle rootful resize in ResizeWindow
    + xwayland: Move XRandR emulation to the ResizeWindow hook
    + xwayland: Use correct xwl_window lookup function in xwl_set_shape
- eglstreams has been dropped

- Update to bug fix relesae 23.2.7
  * m4: drop autoconf leftovers
  * xwayland: Send ei_device_frame on device_scroll_discrete
  * xwayland: Call drmFreeDevice for dma-buf default feedback
  * xwayland: Use drmDevicesEqual in xwl_dmabuf_feedback_tranche_done
  * dri3: Free formats in cache_formats_and_modifiers
  * xwayland/glamor: Handle depth 15 in gbm_format_for_depth
  * Revert "xwayland/glamor: Avoid implicit redirection with depth 32 parent windows"
  * xwayland: Check for outputs before lease devices
  * xwayland: Do not remove output on withdraw if leased

OBS-URL: https://build.opensuse.org/request/show/1174287
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=32
2024-05-16 15:13:27 +00:00
031b5c0117 - Update to feature release 24.1.0
* This fixes a couple of regressions introduced in the previous release
    candidate versions along with a fix for XTEST emulation with EI.
    + xwayland: Send ei_device_frame on device_scroll_discrete
    + xwayland: Restore the ResizeWindow handler
    + xwayland: Handle rootful resize in ResizeWindow
    + xwayland: Move XRandR emulation to the ResizeWindow hook
    + xwayland: Use correct xwl_window lookup function in xwl_set_shape
- eglstreams has been dropped

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=80
2024-05-15 17:31:00 +00:00
fd199c49b1 - Update to bug fix relesae 23.2.7
* m4: drop autoconf leftovers
  * xwayland: Send ei_device_frame on device_scroll_discrete
  * xwayland: Call drmFreeDevice for dma-buf default feedback
  * xwayland: Use drmDevicesEqual in xwl_dmabuf_feedback_tranche_done
  * dri3: Free formats in cache_formats_and_modifiers
  * xwayland/glamor: Handle depth 15 in gbm_format_for_depth
  * Revert "xwayland/glamor: Avoid implicit redirection with depth 32 parent windows"
  * xwayland: Check for outputs before lease devices
  * xwayland: Do not remove output on withdraw if leased

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=79
2024-05-15 17:19:20 +00:00
Ana Guerrero
3cdac66126 Accepting request 1166452 from X11:XOrg
- Update to 23.2.6
  * This is a quick bug fix release to address a regression
    introduced by the fix for CVE-2024-31083 in xwayland-23.2.5.

OBS-URL: https://build.opensuse.org/request/show/1166452
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=31
2024-04-10 15:48:47 +00:00
c1103fbb35 - Update to 23.2.6
* This is a quick bug fix release to address a regression
    introduced by the fix for CVE-2024-31083 in xwayland-23.2.5.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=77
2024-04-09 13:32:39 +00:00
Ana Guerrero
50fc8dc22c Accepting request 1164509 from X11:XOrg
- Security update 23.2.5 
  This release contains the 3 security fixes that actually apply to
  Xwayland reported in the security advisory of April 3rd 2024
  * CVE-2024-31080
  * CVE-2024-31081
  * CVE-2024-31083
  Additionally, it also contains a couple of other fixes, a copy/paste
  error in the DeviceStateNotify event and a fix to enable buttons with
  pointer gestures for backward compatibility with legacy X11 clients.

OBS-URL: https://build.opensuse.org/request/show/1164509
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=30
2024-04-04 20:24:45 +00:00
522e0129f9 - Security update 23.2.5
This release contains the 3 security fixes that actually apply to
  Xwayland reported in the security advisory of April 3rd 2024
  * CVE-2024-31080
  * CVE-2024-31081
  * CVE-2024-31083
  Additionally, it also contains a couple of other fixes, a copy/paste
  error in the DeviceStateNotify event and a fix to enable buttons with
  pointer gestures for backward compatibility with legacy X11 clients.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=75
2024-04-04 08:12:55 +00:00
Ana Guerrero
2a949fca32 Accepting request 1149619 from X11:XOrg
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1149619
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=29
2024-02-23 15:41:23 +00:00
9c2dfa035c Accepting request 1146917 from home:jtorres:branches:X11:XOrg
- Don't provide xorg-x11-server-source
  * xwayland sources are not meant for a generic server.
  * https://github.com/TigerVNC/tigervnc/issues/1728

OBS-URL: https://build.opensuse.org/request/show/1146917
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=73
2024-02-15 18:36:04 +00:00
239e48c7e2 Accepting request 1146791 from home:jtorres:branches:X11:XOrg
- Provide xorg-x11-server-source from xwayland
  * xwayland will be more updated than xorg-x11-server, so the server sources 
    will be more updated too if are provided by xwayland.
  * Fixes bsc#1219892.

OBS-URL: https://build.opensuse.org/request/show/1146791
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=72
2024-02-15 11:48:50 +00:00
Ana Guerrero
41fcf96945 Accepting request 1139423 from X11:XOrg
- This release contains also the following patches mentioned in
  previous sle15 releases
  * bsc1218582-0001-dix-allocate-enough-space-for-logical-button-maps.patch
  * bsc1218583-0001-dix-Allocate-sufficient-xEvents-for-our-DeviceStateN.patch
  * bsc1218583-0002-dix-fix-DeviceStateNotify-event-calculation.patch
  * bsc1218583-0003-Xi-when-creating-a-new-ButtonClass-set-the-number-of.patch
  * bsc1218584-0001-Xi-flush-hierarchy-events-after-adding-removing-mast.patch
  * bsc1218585-0001-Xi-do-not-keep-linked-list-pointer-during-recursion.patch
  * bsc1218585-0002-dix-when-disabling-a-master-float-disabled-slaved-de.patch

- This release contains also the missing fixes of initial
  U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
  (bsc#1217765)

- Update to version 23.2.4
  * This release contains fixes for the issues reported in today's
    security advisory: 
    https://lists.x.org/archives/xorg/2024-January/061525.html
  * CVE-2023-6816  (bsc#1218582)
  * CVE-2024-0229  (bsc#1218583)
  * CVE-2024-21885 (bsc#1218584)
  * CVE-2024-21886 (bsc#1218585)
  * CVE-2024-0408
  * CVE-2024-0409
- supersedes the patches mentioned below:
  * U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
  * U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch

OBS-URL: https://build.opensuse.org/request/show/1139423
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=28
2024-01-17 21:15:43 +00:00
cabd027c81 - This release contains also the following patches mentioned in
previous sle15 releases
  * bsc1218582-0001-dix-allocate-enough-space-for-logical-button-maps.patch
  * bsc1218583-0001-dix-Allocate-sufficient-xEvents-for-our-DeviceStateN.patch
  * bsc1218583-0002-dix-fix-DeviceStateNotify-event-calculation.patch
  * bsc1218583-0003-Xi-when-creating-a-new-ButtonClass-set-the-number-of.patch
  * bsc1218584-0001-Xi-flush-hierarchy-events-after-adding-removing-mast.patch
  * bsc1218585-0001-Xi-do-not-keep-linked-list-pointer-during-recursion.patch
  * bsc1218585-0002-dix-when-disabling-a-master-float-disabled-slaved-de.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=70
2024-01-17 10:23:42 +00:00
5fb8e89688 - This release contains also the missing fixes of initial
U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
  (bsc#1217765)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=69
2024-01-16 21:10:37 +00:00
052ab588dd - Update to version 23.2.4
* This release contains fixes for the issues reported in today's
    security advisory: 
    https://lists.x.org/archives/xorg/2024-January/061525.html
  * CVE-2023-6816  (bsc#1218582)
  * CVE-2024-0229  (bsc#1218583)
  * CVE-2024-21885 (bsc#1218584)
  * CVE-2024-21886 (bsc#1218585)
  * CVE-2024-0408
  * CVE-2024-0409
- supersedes the patches mentioned below:
  * U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
  * U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=68
2024-01-16 13:24:49 +00:00
Ana Guerrero
bcd98aa177 Accepting request 1132832 from X11:XOrg
- U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
  * Out-of-bounds memory write in XKB button actions (CVE-2023-6377, 
    ZDI-CAN-22412, ZDI-CAN-22413, bsc#1217765)
- U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch
  * Out-of-bounds memory read in RRChangeOutputProperty and
    RRChangeProviderProperty (CVE-2023-6478, ZDI-CAN-22561,
    bsc#1217766)

OBS-URL: https://build.opensuse.org/request/show/1132832
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=27
2023-12-14 21:02:28 +00:00
52070dd5da Added missing fixes on U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch.
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=66
2023-12-13 10:06:37 +00:00
d2072e0686 - U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch
* Out-of-bounds memory write in XKB button actions (CVE-2023-6377, 
    ZDI-CAN-22412, ZDI-CAN-22413, bsc#1217765)
- U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch
  * Out-of-bounds memory read in RRChangeOutputProperty and
    RRChangeProviderProperty (CVE-2023-6478, ZDI-CAN-22561,
    bsc#1217766)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=65
2023-12-13 09:18:11 +00:00
Ana Guerrero
78e692b0b7 Accepting request 1128531 from X11:XOrg
- This release contains the following patches mentioned in previous
  sle15 releases
  * U_Xext-fix-invalid-event-type-mask-in-XTestSwapFakeInp.patch:
    fixes regression introduced with security update for
    CVE-2022-46340 (bsc#1205874)     
  * U_bsc1216135-Xi-randr-fix-handling-of-PropModeAppend-Prepend.patch:
    fix handling of PropModeAppend/Prepend ((CVE-2023-5367, ZDI-CAN-22153,
    bsc#1216135)
  * U_bsc1216261-0001-mi-fix-CloseScreen-initialization-order.patch,
    U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patch:
    Server Damage Object Use-After-Free Local Privilege Escalation
    Vulnerability (CVE-2023-5574, ZDI-CAN-21213, bsc#1216261)
  * U_bsc1216261-0003-dix-always-initialize-pScreen-CloseScreen.patch:
    fixes a regresion, which can trigger a segfault in Xwayland on
    exit, introduced by 
    U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patch 
    (CVE-2023-5574, ZDI-CAN-21213, bsc#1216261)

OBS-URL: https://build.opensuse.org/request/show/1128531
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=26
2023-11-27 21:43:13 +00:00
a607c3c14a - This release contains the following patches mentioned in previous
sle15 releases
  * U_Xext-fix-invalid-event-type-mask-in-XTestSwapFakeInp.patch:
    fixes regression introduced with security update for
    CVE-2022-46340 (bsc#1205874)     
  * U_bsc1216135-Xi-randr-fix-handling-of-PropModeAppend-Prepend.patch:
    fix handling of PropModeAppend/Prepend ((CVE-2023-5367, ZDI-CAN-22153,
    bsc#1216135)
  * U_bsc1216261-0001-mi-fix-CloseScreen-initialization-order.patch,
    U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patch:
    Server Damage Object Use-After-Free Local Privilege Escalation
    Vulnerability (CVE-2023-5574, ZDI-CAN-21213, bsc#1216261)
  * U_bsc1216261-0003-dix-always-initialize-pScreen-CloseScreen.patch:
    fixes a regresion, which can trigger a segfault in Xwayland on
    exit, introduced by 
    U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patch 
    (CVE-2023-5574, ZDI-CAN-21213, bsc#1216261)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=63
2023-11-24 10:37:02 +00:00
Ana Guerrero
51717ce020 Accepting request 1120261 from X11:XOrg
- Update to version 23.2.2
  * This release contains the fix for CVE-2023-5367 and CVE-2023-5574
    in today's security advisory: 
      https://lists.x.org/archives/xorg-announce/2023-October/003430.html
    Xwayland does not support multiple protocol screens (Zaphod) and is thus
    not affected by CVE-2023-5380.
  * Additionally, there is a change in the default behaviour of Xwayland:
    Since version 23.2.0 Xwayland (via liboeffis) automatically tries to
    connect to the XDG Desktop Portal's RemoteDesktop interface to obtain
    the EI socket. That socket is used to send XTest events to the
    compositor.
  * However, the connection to the session-wide Portal is unsuitable when
    Xwayland is running in a nested compositor. Xwayland cannot tell whether
    it's running on a nested compositor and to keep backwards compatibility
    with Xwayland prior to 23.2.0, Xwayland must now be started with
    "-enable-ei-portal" to connect to the portal.
  * Compositors (who typically spawn Xwayland rootless) must now pass this
    option to get the same behaviour as 23.2.x.
  * Finally, Xwayland now uses libbsd-overlay instead of libbsd.

OBS-URL: https://build.opensuse.org/request/show/1120261
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=25
2023-10-25 16:02:10 +00:00
5c74965cd2 * This release contains the fix for CVE-2023-5367 and CVE-2023-5574
in today's security advisory: 
      https://lists.x.org/archives/xorg-announce/2023-October/003430.html

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=61
2023-10-25 12:24:48 +00:00
d0b2a94624 - Update to version 23.2.2
* This release contains the fix for CVE-2023-5367 in today's security
    advisory: https://lists.x.org/archives/xorg-announce/2023-October/003430.html
    Xwayland does not support multiple protocol screens (Zaphod) and is thus
    not affected by CVE-2023-5380.
  * Additionally, there is a change in the default behaviour of Xwayland:
    Since version 23.2.0 Xwayland (via liboeffis) automatically tries to
    connect to the XDG Desktop Portal's RemoteDesktop interface to obtain
    the EI socket. That socket is used to send XTest events to the
    compositor.
  * However, the connection to the session-wide Portal is unsuitable when
    Xwayland is running in a nested compositor. Xwayland cannot tell whether
    it's running on a nested compositor and to keep backwards compatibility
    with Xwayland prior to 23.2.0, Xwayland must now be started with
    "-enable-ei-portal" to connect to the portal.
  * Compositors (who typically spawn Xwayland rootless) must now pass this
    option to get the same behaviour as 23.2.x.
  * Finally, Xwayland now uses libbsd-overlay instead of libbsd.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=60
2023-10-25 10:54:37 +00:00
Ana Guerrero
a0994645d7 Accepting request 1112502 from X11:XOrg
- Update to version 23.2.1:
  * glamor: Ignore destination alpha as necessary for composite operation
  * xtest: Check whether there is a sendEventsProc to call
- supersedes xwayland-glamor-Ignore-destination-alpha-as-necessary-for-com.patch

- xwayland-glamor-Ignore-destination-alpha-as-necessary-for-com.patch
  * Fix when vncviewer fades to white on xwayland (bsc#1215385,
    https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1154)
------------------------------------------------------------------

OBS-URL: https://build.opensuse.org/request/show/1112502
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=24
2023-09-22 19:47:05 +00:00
fb0adef406 - Update to version 23.2.1:
* glamor: Ignore destination alpha as necessary for composite operation
  * xtest: Check whether there is a sendEventsProc to call
- supersedes xwayland-glamor-Ignore-destination-alpha-as-necessary-for-com.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=58
2023-09-20 09:00:14 +00:00
3ebebb9666 Accepting request 1112032 from home:jtorres:branches:X11:XOrg
- xwayland-glamor-Ignore-destination-alpha-as-necessary-for-com.patch
  * Fix when vncviewer fades to white on xwayland (bsc#1215385,
    https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1154)
------------------------------------------------------------------

OBS-URL: https://build.opensuse.org/request/show/1112032
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=57
2023-09-18 15:56:38 +00:00
Ana Guerrero
ebc7564b4f Accepting request 1105976 from X11:XOrg
- enable libei and libdecor only for TW, since it does not exist
  yet on sle15-sp5

- Update to version 23.2.0:
  * Optional support for emulated input (EI) via the libei library,
    support for the tearing control protocol, and the XWayland
    rootful mode is now resizable with libdecor.
- Add pkgconfig(libei-1.0) BuildRequires, build new optional
  emulated input support.
- Add pkgconfig(libdecor-0) BuildRequires, build optional CSD
  support.

OBS-URL: https://build.opensuse.org/request/show/1105976
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=23
2023-08-30 08:19:07 +00:00
ba09ef145c - enable libei and libdecor only for TW, since it does not exist
yet on sle15-sp5

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=55
2023-08-26 04:18:40 +00:00
b21ebb9c49 Accepting request 1104339 from home:iznogood:branches:X11:XOrg
- Update to version 23.2.0:
  * Optional support for emulated input (EI) via the libei library,
    support for the tearing control protocol, and the XWayland
    rootful mode is now resizable with libdecor.
- Add pkgconfig(libei-1.0) BuildRequires, build new optional
  emulated input support.
- Add pkgconfig(libdecor-0) BuildRequires, build optional CSD
  support.

OBS-URL: https://build.opensuse.org/request/show/1104339
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=54
2023-08-26 04:11:07 +00:00
b5b6781ef6 Accepting request 1091980 from X11:XOrg
- Update to version 23.1.2
  * This release includes improved DMA-BUF v4 feedback support for
    direct scanout, relaxed CVT modes for non-standard modes, fixes
    for the CHERI/Morello platform and other various fixes.

OBS-URL: https://build.opensuse.org/request/show/1091980
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=22
2023-06-12 13:25:05 +00:00
2fe614940a - Update to version 23.1.2
* This release includes improved DMA-BUF v4 feedback support for
    direct scanout, relaxed CVT modes for non-standard modes, fixes
    for the CHERI/Morello platform and other various fixes.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=52
2023-06-10 11:25:39 +00:00
517094ce39 Accepting request 1076662 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/1076662
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=21
2023-04-02 17:16:55 +00:00
83be5d2e19 Accepting request 1076649 from home:iznogood:branches:X11:XOrg
- Update to version 23.1.1 (CVE-2023-1393):
  + This release contains the fix for CVE-2023-1393.
  + xkbUtils: use existing symbol names instead of deleted
    deprecated ones
  + glamor: Don't glFlush/ctx switch unless any work has been
    performed
  + xwayland:
    - Refactor xwl_present_for_each_frame_callback helper
    - Prevent nested xwl_present_for_each_frame_callback calls
  + composite: Fix use-after-free of the COW
- Drop U_xserver-composite-Fix-use-after-free-of-the-COW.patch:
  Fixed upstream.

OBS-URL: https://build.opensuse.org/request/show/1076649
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=50
2023-04-01 17:58:43 +00:00
ed1147c606 This can be checked in now https://lists.x.org/archives/xorg-announce/2023-March/003374.html
- U_xserver-composite-Fix-use-after-free-of-the-COW.patch
  * overlay window use-after-free (CVE-2023-1393, ZDI-CAN-19866,
    bsc#1209543)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=49
2023-03-29 13:39:49 +00:00
3127bd732b Accepting request 1073963 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/1073963
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=20
2023-03-25 17:54:24 +00:00
c4bf819c04 Accepting request 1073847 from home:iznogood:branches:GNOME:Next
New upstream release

OBS-URL: https://build.opensuse.org/request/show/1073847
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=47
2023-03-23 12:31:26 +00:00
c96d993340 Accepting request 1063637 from X11:XOrg
- Update to version 22.1.8
  * This release contains the fix for CVE-2023-0494 in today's
    security advisory: 
    https://lists.x.org/archives/xorg-announce/2023-February/003320.html
  * It also fixes a second possible OOB access during EnqueueEvent.
- supersedes U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch

- improved summary and description 
- added requires to xkeyboard-config
- added recommends to xorg-x11-fonts-core
- removed unused 'package' section

- U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch
  * DeepCopyPointerClasses use-after-free (CVE-2023-0494, 
    ZDI-CAN-19596, bsc#1207783)

OBS-URL: https://build.opensuse.org/request/show/1063637
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=19
2023-02-08 16:19:51 +00:00
20e8312e25 fixed build
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=45
2023-02-07 14:42:36 +00:00
179bde64cb - Update to version 22.1.8
* This release contains the fix for CVE-2023-0494 in today's
    security advisory: 
    https://lists.x.org/archives/xorg-announce/2023-February/003320.html
  * It also fixes a second possible OOB access during EnqueueEvent.
- supersedes U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=44
2023-02-07 14:32:28 +00:00
cd5cddf487 - improved summary and description
- added requires to xkeyboard-config
- added recommends to xorg-x11-fonts-core
- removed unused 'package' section

- U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch
  * DeepCopyPointerClasses use-after-free (CVE-2023-0494, 
    ZDI-CAN-19596, bsc#1207783)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=43
2023-02-07 02:57:30 +00:00
f4046f0d8d Accepting request 1045936 from X11:XOrg
- Update to version 22.1.7
  * This release fixes an invalid event type mask in 
    XTestSwapFakeInput which was inadvertently changed from octal
    0177 to hexadecimal 0x177 in the fix for CVE-2022-46340.

- Update to version 22.1.6:
  * Fixes CVE-2022-46340, CVE-2022-46341, CVE-2022-46342,
    CVE-2022-46343, CVE-2022-46344, CVE-2022-4283.
  * Xtest: disallow GenericEvents in XTestSwapFakeInput
  * Xi: disallow passive grabs with a detail > 255
  * Xext: free the XvRTVideoNotify when turning off from the same
    client
  * Xext: free the screen saver resource when replacing it
  * Xi: return an error from XI property changes if verification
    failed
  * Xi: avoid integer truncation in length check of
    ProcXIChangeProperty
  * xkb: reset the radio_groups pointer to NULL after freeing it
- Drop patches fixed upstream:
  * U_0001-Xtest-disallow-GenericEvents-in-XTestSwapFakeInput.patch
  * U_0002-Xi-return-an-error-from-XI-property-changes-if-verif.patch
  * U_0003-Xi-avoid-integer-truncation-in-length-check-of-ProcX.patch
  * U_0004-Xi-disallow-passive-grabs-with-a-detail-255.patch
  * U_0005-Xext-free-the-screen-saver-resource-when-replacing-i.patch
  * U_0006-Xext-free-the-XvRTVideoNotify-when-turning-off-from-.patch
  * U_0007-xkb-reset-the-radio_groups-pointer-to-NULL-after-fre.patch

OBS-URL: https://build.opensuse.org/request/show/1045936
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=18
2023-01-01 08:38:28 +00:00
d812376723 - Update to version 22.1.7
* This release fixes an invalid event type mask in 
    XTestSwapFakeInput which was inadvertently changed from octal
    0177 to hexadecimal 0x177 in the fix for CVE-2022-46340.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=41
2022-12-31 16:10:29 +00:00
857973a615 Accepting request 1043174 from home:iznogood:branches:X11:XOrg
Please note that I did not find a public key for peter.hutterer@who-t.net that did this release, so the keyring included here is wrong as it is for a different person....

- Update to version 22.1.6:
  * Fixes CVE-2022-46340, CVE-2022-46341, CVE-2022-46342,
    CVE-2022-46343, CVE-2022-46344, CVE-2022-4283.
  * Xtest: disallow GenericEvents in XTestSwapFakeInput
  * Xi: disallow passive grabs with a detail > 255
  * Xext: free the XvRTVideoNotify when turning off from the same
    client
  * Xext: free the screen saver resource when replacing it
  * Xi: return an error from XI property changes if verification
    failed
  * Xi: avoid integer truncation in length check of
    ProcXIChangeProperty
  * xkb: reset the radio_groups pointer to NULL after freeing it
- Drop patches fixed upstream:
  * U_0001-Xtest-disallow-GenericEvents-in-XTestSwapFakeInput.patch
  * U_0002-Xi-return-an-error-from-XI-property-changes-if-verif.patch
  * U_0003-Xi-avoid-integer-truncation-in-length-check-of-ProcX.patch
  * U_0004-Xi-disallow-passive-grabs-with-a-detail-255.patch
  * U_0005-Xext-free-the-screen-saver-resource-when-replacing-i.patch
  * U_0006-Xext-free-the-XvRTVideoNotify-when-turning-off-from-.patch
  * U_0007-xkb-reset-the-radio_groups-pointer-to-NULL-after-fre.patch

OBS-URL: https://build.opensuse.org/request/show/1043174
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=40
2022-12-31 13:06:57 +00:00
a0bbe6e505 Accepting request 1042896 from X11:XOrg
- U_0007-xkb-reset-the-radio_groups-pointer-to-NULL-after-fre.patch
  * XkbGetKbdByName use-after-free (ZDI-CAN-19530, CVE-2022-4283,
    bsc#1206017)

- U_0001-Xtest-disallow-GenericEvents-in-XTestSwapFakeInput.patch
  * Server XTestSwapFakeInput stack overflow (ZDI-CAN 19265,
    CVE-2022-46340, bsc#1205874)
- U_0002-Xi-return-an-error-from-XI-property-changes-if-verif.patch
  * Xi: return an error from XI property changes if verification
    failed (no ZDI-CAN id, no CVE id, bsc#1205875)
- U_0003-Xi-avoid-integer-truncation-in-length-check-of-ProcX.patch
  * Server XIChangeProperty out-of-bounds access (ZDI-CAN 19405,
    CVE-2022-46344, bsc#1205876)
- U_0004-Xi-disallow-passive-grabs-with-a-detail-255.patch
  * Server XIPassiveUngrabDevice out-of-bounds access (ZDI-CAN 19381,
    CVE-2022-46341, bsc#1205877)
- U_0005-Xext-free-the-screen-saver-resource-when-replacing-i.patch
  * Server ScreenSaverSetAttributes use-after-free (ZDI-CAN 19404,
    CVE-2022-46343, bsc#1205878)
- U_0006-Xext-free-the-XvRTVideoNotify-when-turning-off-from-.patch
  * Server XvdiSelectVideoNotify use-after-free (ZDI-CAN 19400,
    CVE-2022-46342, bsc#1205879)

OBS-URL: https://build.opensuse.org/request/show/1042896
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=17
2022-12-15 18:24:16 +00:00
9ffe7271ae - U_0007-xkb-reset-the-radio_groups-pointer-to-NULL-after-fre.patch
* XkbGetKbdByName use-after-free (ZDI-CAN-19530, CVE-2022-4283,
    bsc#1206017)

- U_0001-Xtest-disallow-GenericEvents-in-XTestSwapFakeInput.patch
  * Server XTestSwapFakeInput stack overflow (ZDI-CAN 19265,
    CVE-2022-46340, bsc#1205874)
- U_0002-Xi-return-an-error-from-XI-property-changes-if-verif.patch
  * Xi: return an error from XI property changes if verification
    failed (no ZDI-CAN id, no CVE id, bsc#1205875)
- U_0003-Xi-avoid-integer-truncation-in-length-check-of-ProcX.patch
  * Server XIChangeProperty out-of-bounds access (ZDI-CAN 19405,
    CVE-2022-46344, bsc#1205876)
- U_0004-Xi-disallow-passive-grabs-with-a-detail-255.patch
  * Server XIPassiveUngrabDevice out-of-bounds access (ZDI-CAN 19381,
    CVE-2022-46341, bsc#1205877)
- U_0005-Xext-free-the-screen-saver-resource-when-replacing-i.patch
  * Server ScreenSaverSetAttributes use-after-free (ZDI-CAN 19404,
    CVE-2022-46343, bsc#1205878)
- U_0006-Xext-free-the-XvRTVideoNotify-when-turning-off-from-.patch
  * Server XvdiSelectVideoNotify use-after-free (ZDI-CAN 19400,
    CVE-2022-46342, bsc#1205879)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=38
2022-12-14 10:49:13 +00:00
373e968b4f Accepting request 1032862 from X11:XOrg
- Update to version 22.1.5
  * This is a follow-up release to address a couple of regressions
    which found their way into the recent xwayland-22.1.4 release,
    namely:
    + Double scroll wheel events with some Wayland compositors
      https://gitlab.freedesktop.org/xorg/xserver/-/issues/1392
    + Key keeps repeating when a window is closed while a key is pressed
      https://gitlab.freedesktop.org/xorg/xserver/-/issues/1395
- supersedes U_Do-not-ignore-leave-events.patch

OBS-URL: https://build.opensuse.org/request/show/1032862
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=16
2022-11-03 18:13:30 +00:00
cfa57197f6 - Update to version 22.1.5
* This is a follow-up release to address a couple of regressions
    which found their way into the recent xwayland-22.1.4 release,
    namely:
    + Double scroll wheel events with some Wayland compositors
      https://gitlab.freedesktop.org/xorg/xserver/-/issues/1392
    + Key keeps repeating when a window is closed while a key is pressed
      https://gitlab.freedesktop.org/xorg/xserver/-/issues/1395
- supersedes U_Do-not-ignore-leave-events.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=36
2022-11-02 11:41:57 +00:00
af63d5ea0a Accepting request 1030894 from X11:XOrg
- U_Do-not-ignore-leave-events.patch
  * fixes xwayland issue#1397, issue#1395

- Update to version 22.1.4
  * xwayland: Aggregate scroll axis events to fix kinetic scrolling
  * Forbid server grabs by non-WM on *rootless* XWayland
  * xkb: Avoid length-check failure on empty strings.
  * ci: remove redundant slash in libxcvt repository url
  * dix: Skip more code in SetRootClip for ROOT_CLIP_INPUT_ONLY
  * dix: Fix overzealous caching of ResourceClientBits()
  * xwayland: Prevent Xserver grabs with rootless
  * xwayland: Delay wl_surface destruction
  * build: Bump wayland requirement to 1.18
  * xwayland: set tag on our surfaces
  * xwayland: Clear the "xwl-window" tag on unrealize
  * xwayland: correct the type for the discrete scroll events
  * xkb: fix some possible memleaks in XkbGetKbdByName
  * xkb: length-check XkbGetKbdByName before accessing the fields
  * xkb: length-check XkbListComponents before accessing the fields
  * xkb: proof GetCountedString against request length attacks
- supersedes security patches:
  * U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
  * U_xkb-proof-GetCountedString-against-request-length-at.patch

OBS-URL: https://build.opensuse.org/request/show/1030894
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=15
2022-10-25 09:18:30 +00:00
135c2fa712 - U_Do-not-ignore-leave-events.patch
* fixes xwayland issue#1397, issue#1395

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=34
2022-10-24 14:06:45 +00:00
c2484d7746 - Update to version 22.1.4
* xwayland: Aggregate scroll axis events to fix kinetic scrolling
  * Forbid server grabs by non-WM on *rootless* XWayland
  * xkb: Avoid length-check failure on empty strings.
  * ci: remove redundant slash in libxcvt repository url
  * dix: Skip more code in SetRootClip for ROOT_CLIP_INPUT_ONLY
  * dix: Fix overzealous caching of ResourceClientBits()
  * xwayland: Prevent Xserver grabs with rootless
  * xwayland: Delay wl_surface destruction
  * build: Bump wayland requirement to 1.18
  * xwayland: set tag on our surfaces
  * xwayland: Clear the "xwl-window" tag on unrealize
  * xwayland: correct the type for the discrete scroll events
  * xkb: fix some possible memleaks in XkbGetKbdByName
  * xkb: length-check XkbGetKbdByName before accessing the fields
  * xkb: length-check XkbListComponents before accessing the fields
  * xkb: proof GetCountedString against request length attacks
- supersedes security patches:
  * U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
  * U_xkb-proof-GetCountedString-against-request-length-at.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=33
2022-10-20 12:00:58 +00:00
068a23baf0 Accepting request 1030010 from X11:XOrg
- U_xkb-proof-GetCountedString-against-request-length-at.patch
  * security update for CVE-2022-3550 (bsc#1204412)
- U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
  * security update for CVE-2022-3551 (bsc#1204416)

OBS-URL: https://build.opensuse.org/request/show/1030010
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=14
2022-10-20 09:10:09 +00:00
e62daa6f30 - U_xkb-proof-GetCountedString-against-request-length-at.patch
* security update for CVE-2022-3550 (bsc#1204412)
- U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch
  * security update for CVE-2022-3551 (bsc#1204416)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=31
2022-10-19 11:33:42 +00:00
35f20a7931 Accepting request 988657 from X11:XOrg
- Update to version 22.1.3
  * os: print <signal handler called> if unw_is_signal_frame()
  * os: print registers in the libunwind version of xorg_backtrace()
  * xwayland/present: Do not send two idle notify events for flip pixmaps
  * xwayland: Fix check logic in sprite_check_lost_focus()
  * xwayland: Change randr_output status when call xwl_output_remove()
  * xkb: switch to array index loops to moving pointers
  * xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck
  * xkb: add request length validation for XkbSetGeometry

OBS-URL: https://build.opensuse.org/request/show/988657
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=13
2022-07-13 11:44:43 +00:00
c29ec06029 - Update to version 22.1.3
* os: print <signal handler called> if unw_is_signal_frame()
  * os: print registers in the libunwind version of xorg_backtrace()
  * xwayland/present: Do not send two idle notify events for flip pixmaps
  * xwayland: Fix check logic in sprite_check_lost_focus()
  * xwayland: Change randr_output status when call xwl_output_remove()
  * xkb: switch to array index loops to moving pointers
  * xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck
  * xkb: add request length validation for XkbSetGeometry

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=29
2022-07-12 14:36:42 +00:00
62733acbc0 Accepting request 979155 from X11:XOrg
- Update to version 22.1.2
  * randr: Add "RANDR Emulation" property
  * xwayland/output: Set the "RANDR Emulation" property
  * xwayland: Fix invalid pointer access in drm_lease_device_handle_released.

OBS-URL: https://build.opensuse.org/request/show/979155
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=12
2022-05-26 16:43:58 +00:00
4eab585fb5 - Update to version 22.1.2
* randr: Add "RANDR Emulation" property
  * xwayland/output: Set the "RANDR Emulation" property
  * xwayland: Fix invalid pointer access in drm_lease_device_handle_released.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=27
2022-05-25 10:12:19 +00:00
546b6791aa Accepting request 966177 from X11:XOrg
- Update to version 22.1.1
  * xwayland: Clear timer_armed in xwl_present_unrealize_window
  * xwayland: Always hook up frame_callback_list in xwl_present_queue_vblank
  * Xwayland: Do not map the COW by default when rootless
  * xwayland/present: Fix use-after-free in xwl_unrealize_window()

OBS-URL: https://build.opensuse.org/request/show/966177
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=11
2022-04-04 17:25:48 +00:00
0e4abd719c - Update to version 22.1.1
* xwayland: Clear timer_armed in xwl_present_unrealize_window
  * xwayland: Always hook up frame_callback_list in xwl_present_queue_vblank
  * Xwayland: Do not map the COW by default when rootless
  * xwayland/present: Fix use-after-free in xwl_unrealize_window()

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=25
2022-03-31 09:39:46 +00:00
5d1b06b789 Accepting request 955407 from X11:XOrg
- Update to version 22.1.0
  * xwayland: Fix cursor color

OBS-URL: https://build.opensuse.org/request/show/955407
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=10
2022-02-17 22:39:55 +00:00
36bf4e698d - Update to version 22.1.0
* xwayland: Fix cursor color

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=24
2022-02-16 15:44:03 +00:00
d1ea194252 Accepting request 950846 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/950846
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=9
2022-02-06 22:53:20 +00:00
a8a29eb616 Accepting request 950845 from GNOME:Next
OBS-URL: https://build.opensuse.org/request/show/950845
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=23
2022-02-03 05:19:41 +00:00
196f12f825 Accepting request 947907 from home:iznogood:branches:X11:XOrg
I realize it is to early to push this RC to TW, but perhaps we can have it in the devel repo for now?

- Update to version 22.0.99.901
  * DRM lease support
  * Enables sRGB fbconfigs in GLX
  * Requires libxcvt
  * Refactoring of the present code in Xwayland
  * Implements support for touchpad gestures
  * Support for xfixes's ClientDisconnectMode and optional
    terminate delay
- Add pkgconfig(libxcvt) BuildRequires: New dependency.
- Add xwayland.keyring, use url for sources, validate sig.
- Move man pages from devel to main binary package.
- Enable LTO, no longer disable LTO via macro.

OBS-URL: https://build.opensuse.org/request/show/947907
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=22
2022-01-21 10:15:34 +00:00
f2b7c210bb Accepting request 941877 from X11:XOrg
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/941877
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=8
2021-12-22 19:17:56 +00:00
208189730c - Update to version 21.1.4
* Fixes for multiple input validation failures in X server extensions:
    + CVE-2021-4008/ZDI-CAN-14192 SProcRenderCompositeGlyphs out-of-bounds access (boo#1193030)
    + CVE-2021-4009/ZDI-CAN 14950 SProcXFixesCreatePointerBarrier out-of-bounds access (boo#1190487)
    + CVE-2021-4010/ZDI-CAN-14951 SProcScreenSaverSuspend out-of-bounds access (boo#1190488)
    + CVE-2021-4011/ZDI-CAN-14952 SwapCreateRegister out-of-bounds access (boo#1190489)
  * This release also includes other fixes such as:
    + Store EGLcontext to avoid superfluous eglMakeCurrent() calls
    + Prefer EGLStream with NVIDIA proprietary driver if both GBM and EGLstream are available

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=21
2021-12-14 15:52:17 +00:00
2b4f3ca0e2 Accepting request 930159 from X11:XOrg
- Update to version 21.1.3
  * Most notable change is a fix for the GBM backend to work with
    the Nvidia driver series 495.
- supersedes U_glamor-Fix-handling-of-1-bit-pixmaps.patch

OBS-URL: https://build.opensuse.org/request/show/930159
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=7
2021-11-10 20:45:59 +00:00
d7a635924e - Update to version 21.1.3
* Most notable change is a fix for the GBM backend to work with
    the Nvidia driver series 495.
- supersedes U_glamor-Fix-handling-of-1-bit-pixmaps.patch

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=20
2021-11-08 11:52:57 +00:00
2f111713e0 Accepting request 923789 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/923789
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=6
2021-10-11 14:48:35 +00:00
404c004e8b Accepting request 923786 from home:jtorres:branches:X11:XOrg
Add  Obsoletes: xorg-x11* line again

OBS-URL: https://build.opensuse.org/request/show/923786
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=19
2021-10-07 14:51:26 +00:00
b040d59135 Accepting request 922042 from X11:XOrg
- U_glamor-Fix-handling-of-1-bit-pixmaps.patch
  * glamor: Fix handling of 1-bit pixmaps; fixes e.g. issues with
    gimp on Wayland (which needs Xwayland) (boo#1189310)

OBS-URL: https://build.opensuse.org/request/show/922042
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=5
2021-10-05 20:33:26 +00:00
43f7afd527 added reference to bug
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=18
2021-09-28 16:41:43 +00:00
6d029bc334 - U_glamor-Fix-handling-of-1-bit-pixmaps.patch
* glamor: Fix handling of 1-bit pixmaps; fixes e.g. issues with
    gimp on Wayland (which needs Xwayland)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=17
2021-09-28 16:36:39 +00:00
b459114bb4 Accepting request 921771 from X11:XOrg
- covers jira#SLE/SLE-18653

OBS-URL: https://build.opensuse.org/request/show/921771
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=4
2021-09-27 18:09:03 +00:00
29a6167115 - covers jira#SLE/SLE-18653
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=16
2021-09-27 11:58:10 +00:00
3467dc8b62 Accepting request 906524 from X11:XOrg
OBS-URL: https://build.opensuse.org/request/show/906524
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=3
2021-07-16 20:12:46 +00:00
e3490aa049 Accepting request 906521 from home:mmckitrick:branches:X11:XOrg
- xwayland pc is required for S390x and S390

OBS-URL: https://build.opensuse.org/request/show/906521
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=15
2021-07-15 18:43:19 +00:00
99533919ca - Update to version 21.1.2
* The only change compared to the release candidate is a fix for
    a long standing issue where Xwayland wouldn't send events to
    notify clients of RandR configuration changes in some cases.

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=14
2021-07-09 11:24:22 +00:00
6368582523 Accepting request 903407 from X11:XOrg
- Update to version 21.1.1.901 (21.1.2 RC1)
  * It's a bit special, as most of the changes are not the usual 
    stable branch fixes material, but are needed for HW accelerated
    direct rendering with the Nvidia 470 driver (which is currently
    in open beta).
  * changes are mostly specific to the EGLStream backend and do not
    affect the GBM backend. And they make a big difference for users
    of the EGLStream backend.
  * See
      https://lists.fedoraproject.org/archives/list/desktop@lists.fedoraproject.org/thread/BBZVDNST67I2AQOCPSHKYAY6D5Z66JIP/ 
    for more information about testing the EGLStream changes
- enabled Wayland eglstreams (needs new packages egl-wayland and
  eglexternalplatform)

OBS-URL: https://build.opensuse.org/request/show/903407
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=2
2021-07-04 20:10:03 +00:00
4f7e9cac38 - Update to version 21.1.1.901 (21.1.2 RC1)
* It's a bit special, as most of the changes are not the usual 
    stable branch fixes material, but are needed for HW accelerated
    direct rendering with the Nvidia 470 driver (which is currently
    in open beta).
  * changes are mostly specific to the EGLStream backend and do not
    affect the GBM backend. And they make a big difference for users
    of the EGLStream backend.
  * See
      https://lists.fedoraproject.org/archives/list/desktop@lists.fedoraproject.org/thread/BBZVDNST67I2AQOCPSHKYAY6D5Z66JIP/ 
    for more information about testing the EGLStream changes
- enabled Wayland eglstreams (needs new packages egl-wayland and
  eglexternalplatform)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=13
2021-07-01 10:59:43 +00:00
52da95c8ae Accepting request 885118 from X11:XOrg
Initial stand-alone Xwayland package version 21.1.1 (boo#1182677)

OBS-URL: https://build.opensuse.org/request/show/885118
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/xwayland?expand=0&rev=1
2021-04-14 08:10:19 +00:00
14df48d8ff removed all tarballs
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=11
2021-04-13 15:57:37 +00:00
b801bdb076 - Update to version 21.1.1
* Fix XChangeFeedbackControl() request underflow (CVE-2021-3472,
    ZDI-CAN-1259, bsc#1180128)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=10
2021-04-13 15:26:08 +00:00
92d2527e1c Accepting request 884725 from home:tobijk:X11:XOrg
- Additionally to not packing /usr/lib64/xorg/protocol.txt, delete it to fix 
  the build

OBS-URL: https://build.opensuse.org/request/show/884725
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=9
2021-04-12 18:42:42 +00:00
a90c01ea20 Accepting request 884624 from home:gmbr3:Active
- Make vendor name the same as xorg-x11-server

OBS-URL: https://build.opensuse.org/request/show/884624
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=8
2021-04-12 11:20:18 +00:00
ccbc9d9415 - removed conflicting /usr/lib64/xorg/protocol.txt (already in
xorg-x11-server package)

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=7
2021-04-12 09:23:16 +00:00
624bd59a04 - added summary for -devel package
- some cleanup

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=6
2021-04-07 08:58:55 +00:00
b97b3e2ec4 Accepting request 879745 from home:tobijk:X11:XOrg
- Update to version 21.1.0:
  * meson: Make sure XKM_OUTPUT_DIR has a trailing slash
  * xwayland: Fix LeaveNotify for relative pointer
- Highlights compared to xserver 1.20.10:
  * Xwayland's XVideo support (via glamor) now supports NV12
  * glamor can now accelerate some more RENDER extension formats
  * Xwayland's GLX provider now uses the EGL implementation instead of Mesa's
    swrast_dri.so directly
  * Xwayland can now use the wp_viewport Wayland protocol for up-scaling of
    fullscreen applications setting lower resolutions via the RandR / 
    XFree86-VidModeExtension extensions
  * Xwayland now alternates between multiple buffers for all Wayland surfaces,
    making it less of a special case compared to other Wayland clients
  * Xwayland can now use memfd_create for creating buffers shared with the
    Wayland compositor when glamor hardware acceleration is disabled
  * Xwayland has better support for clients using relative mouse input and 
    keyboard grabs
  * An Xwayland.1 manpage is now installed
  * Xwayland now supports -listenfd, -version and -verbose command line options
  * Xwayland now installs an xwayland.pc file which helps discovering the path
    of the installed Xwayland binary and the features it supports
  * Only meson is supported for building
  * Only Xwayland and Xvfb can be built, only Xwayland can be installed

OBS-URL: https://build.opensuse.org/request/show/879745
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=5
2021-03-17 21:41:28 +00:00
218bcfbef8 - update to 21.0.99.902
* second release candidate for the standalone Xwayland 21.1.0 release 
  * meson.build: Keep the protocol version looking like xserver 1.20.x did
  * xwayland: Delay cursor visibility update

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=4
2021-03-04 09:54:56 +00:00
b5f00e0266 - added Buildrequires to pkgconfig(glproto) and pkgconfig(gl) to
fix build on Leap

OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=3
2021-02-26 10:37:40 +00:00
19885a7606 - added Buildrequires to pkgconfig(glproto) to fix build on Leap
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=2
2021-02-26 10:28:17 +00:00
e0047ab424 Accepting request 873819 from home:tobijk:X11:XOrg
With the stop of the general xserver development and no release on sight, we should provide Xwayland on its own, to at least allow wayland users to profit from the ongoing development in this particular area. So here is a first iteration of a stand-alone xwayland package.

See the below link for the release notes:
https://lists.x.org/archives/xorg-announce/2021-February/003071.html

OBS-URL: https://build.opensuse.org/request/show/873819
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xwayland?expand=0&rev=1
2021-02-26 10:10:59 +00:00
23 changed files with 0 additions and 917 deletions

View File

@ -1,49 +0,0 @@
From efca605c45ff51b57f136222b966ce1d610ebc33 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Wed, 27 Nov 2024 11:27:05 +0100
Subject: [PATCH xserver 1/2] Cursor: Refuse to free the root cursor
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
If a cursor reference count drops to 0, the cursor is freed.
The root cursor however is referenced with a specific global variable,
and when the root cursor is freed, the global variable may still point
to freed memory.
Make sure to prevent the rootCursor from being explicitly freed by a
client.
CVE-2025-26594, ZDI-CAN-25544
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
v2: Explicitly forbid XFreeCursor() on the root cursor (Peter Hutterer
<peter.hutterer@who-t.net>)
v3: Return BadCursor instead of BadValue (Michel Dänzer
<michel@daenzer.net>)
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Suggested-by: Peter Hutterer <peter.hutterer@who-t.net>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
dix/dispatch.c | 4 ++++
1 file changed, 4 insertions(+)
Index: xwayland-24.1.4/dix/dispatch.c
===================================================================
--- xwayland-24.1.4.orig/dix/dispatch.c
+++ xwayland-24.1.4/dix/dispatch.c
@@ -3106,6 +3106,10 @@ ProcFreeCursor(ClientPtr client)
rc = dixLookupResourceByType((void **) &pCursor, stuff->id, RT_CURSOR,
client, DixDestroyAccess);
if (rc == Success) {
+ if (pCursor == rootCursor) {
+ client->errorValue = stuff->id;
+ return BadCursor;
+ }
FreeResource(stuff->id, RT_NONE);
return Success;
}

View File

@ -1,43 +0,0 @@
From ded614e74e7175927dd2bc5ef69accaf2de29939 Mon Sep 17 00:00:00 2001
From: Peter Hutterer <peter.hutterer@who-t.net>
Date: Wed, 4 Dec 2024 15:49:43 +1000
Subject: [PATCH xserver 2/2] dix: keep a ref to the rootCursor
CreateCursor returns a cursor with refcount 1 - that refcount is used by
the resource system, any caller needs to call RefCursor to get their own
reference. That happens correctly for normal cursors but for our
rootCursor we keep a variable to the cursor despite not having a ref for
ourselves.
Fix this by reffing/unreffing the rootCursor to ensure our pointer is
valid.
Related to CVE-2025-26594, ZDI-CAN-25544
Reviewed-by: Olivier Fourdan <ofourdan@redhat.com>
---
dix/main.c | 4 ++++
1 file changed, 4 insertions(+)
Index: xwayland-24.1.4/dix/main.c
===================================================================
--- xwayland-24.1.4.orig/dix/main.c
+++ xwayland-24.1.4/dix/main.c
@@ -234,6 +234,8 @@ dix_main(int argc, char *argv[], char *e
FatalError("could not open default cursor font");
}
+ rootCursor = RefCursor(rootCursor);
+
#ifdef PANORAMIX
/*
* Consolidate window and colourmap information for each screen
@@ -274,6 +276,8 @@ dix_main(int argc, char *argv[], char *e
Dispatch();
+ UnrefCursor(rootCursor);
+
UndisplayDevices();
DisableAllDevices();

View File

@ -1,57 +0,0 @@
From 98602942c143075ab7464f917e0fc5d31ce28c3f Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Wed, 27 Nov 2024 14:41:45 +0100
Subject: [PATCH xserver] xkb: Fix buffer overflow in XkbVModMaskText()
The code in XkbVModMaskText() allocates a fixed sized buffer on the
stack and copies the virtual mod name.
There's actually two issues in the code that can lead to a buffer
overflow.
First, the bound check mixes pointers and integers using misplaced
parenthesis, defeating the bound check.
But even though, if the check fails, the data is still copied, so the
stack overflow will occur regardless.
Change the logic to skip the copy entirely if the bound check fails.
CVE-2025-26595, ZDI-CAN-25545
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
xkb/xkbtext.c | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
Index: xwayland-24.1.4/xkb/xkbtext.c
===================================================================
--- xwayland-24.1.4.orig/xkb/xkbtext.c
+++ xwayland-24.1.4/xkb/xkbtext.c
@@ -174,14 +174,14 @@ XkbVModMaskText(XkbDescPtr xkb,
len = strlen(tmp) + 1 + (str == buf ? 0 : 1);
if (format == XkbCFile)
len += 4;
- if ((str - (buf + len)) <= VMOD_BUFFER_SIZE) {
- if (str != buf) {
- if (format == XkbCFile)
- *str++ = '|';
- else
- *str++ = '+';
- len--;
- }
+ if ((str - buf) + len > VMOD_BUFFER_SIZE)
+ continue; /* Skip */
+ if (str != buf) {
+ if (format == XkbCFile)
+ *str++ = '|';
+ else
+ *str++ = '+';
+ len--;
}
if (format == XkbCFile)
sprintf(str, "%sMask", tmp);

View File

@ -1,41 +0,0 @@
From b41f6fce201e77a174550935330e2f7772d4adf9 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Thu, 28 Nov 2024 11:49:34 +0100
Subject: [PATCH xserver] xkb: Fix computation of XkbSizeKeySyms
The computation of the length in XkbSizeKeySyms() differs from what is
actually written in XkbWriteKeySyms(), leading to a heap overflow.
Fix the calculation in XkbSizeKeySyms() to match what kbWriteKeySyms()
does.
CVE-2025-26596, ZDI-CAN-25543
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
xkb/xkb.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
Index: xwayland-24.1.4/xkb/xkb.c
===================================================================
--- xwayland-24.1.4.orig/xkb/xkb.c
+++ xwayland-24.1.4/xkb/xkb.c
@@ -1092,10 +1092,10 @@ XkbSizeKeySyms(XkbDescPtr xkb, xkbGetMap
len = rep->nKeySyms * SIZEOF(xkbSymMapWireDesc);
symMap = &xkb->map->key_sym_map[rep->firstKeySym];
for (i = nSyms = 0; i < rep->nKeySyms; i++, symMap++) {
- if (symMap->offset != 0) {
- nSymsThisKey = XkbNumGroups(symMap->group_info) * symMap->width;
- nSyms += nSymsThisKey;
- }
+ nSymsThisKey = XkbNumGroups(symMap->group_info) * symMap->width;
+ if (nSymsThisKey == 0)
+ continue;
+ nSyms += nSymsThisKey;
}
len += nSyms * 4;
rep->totalSyms = nSyms;

View File

@ -1,38 +0,0 @@
From c5114475db18f29d639537d60e135bdfc11a5d3a Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Thu, 28 Nov 2024 14:09:04 +0100
Subject: [PATCH xserver] xkb: Fix buffer overflow in XkbChangeTypesOfKey()
If XkbChangeTypesOfKey() is called with nGroups == 0, it will resize the
key syms to 0 but leave the key actions unchanged.
If later, the same function is called with a non-zero value for nGroups,
this will cause a buffer overflow because the key actions are of the wrong
size.
To avoid the issue, make sure to resize both the key syms and key actions
when nGroups is 0.
CVE-2025-26597, ZDI-CAN-25683
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
xkb/XKBMisc.c | 1 +
1 file changed, 1 insertion(+)
Index: xwayland-24.1.4/xkb/XKBMisc.c
===================================================================
--- xwayland-24.1.4.orig/xkb/XKBMisc.c
+++ xwayland-24.1.4/xkb/XKBMisc.c
@@ -552,6 +552,7 @@ XkbChangeTypesOfKey(XkbDescPtr xkb,
i = XkbSetNumGroups(i, 0);
xkb->map->key_sym_map[key].group_info = i;
XkbResizeKeySyms(xkb, key, 0);
+ XkbResizeKeyActions(xkb, key, 0);
return Success;
}

View File

@ -1,112 +0,0 @@
From 0f5ea9d269ac6225bcb302a1ec0f58878114da9f Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 16 Dec 2024 11:25:11 +0100
Subject: [PATCH xserver] Xi: Fix barrier device search
The function GetBarrierDevice() would search for the pointer device
based on its device id and return the matching value, or supposedly NULL
if no match was found.
Unfortunately, as written, it would return the last element of the list
if no matching device id was found which can lead to out of bounds
memory access.
Fix the search function to return NULL if not matching device is found,
and adjust the callers to handle the case where the device cannot be
found.
CVE-2025-26598, ZDI-CAN-25740
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
Xi/xibarriers.c | 27 +++++++++++++++++++++++----
1 file changed, 23 insertions(+), 4 deletions(-)
Index: xwayland-24.1.4/Xi/xibarriers.c
===================================================================
--- xwayland-24.1.4.orig/Xi/xibarriers.c
+++ xwayland-24.1.4/Xi/xibarriers.c
@@ -129,14 +129,15 @@ static void FreePointerBarrierClient(str
static struct PointerBarrierDevice *GetBarrierDevice(struct PointerBarrierClient *c, int deviceid)
{
- struct PointerBarrierDevice *pbd = NULL;
+ struct PointerBarrierDevice *p, *pbd = NULL;
- xorg_list_for_each_entry(pbd, &c->per_device, entry) {
- if (pbd->deviceid == deviceid)
+ xorg_list_for_each_entry(p, &c->per_device, entry) {
+ if (p->deviceid == deviceid) {
+ pbd = p;
break;
+ }
}
- BUG_WARN(!pbd);
return pbd;
}
@@ -337,6 +338,9 @@ barrier_find_nearest(BarrierScreenPtr cs
double distance;
pbd = GetBarrierDevice(c, dev->id);
+ if (!pbd)
+ continue;
+
if (pbd->seen)
continue;
@@ -445,6 +449,9 @@ input_constrain_cursor(DeviceIntPtr dev,
nearest = &c->barrier;
pbd = GetBarrierDevice(c, master->id);
+ if (!pbd)
+ continue;
+
new_sequence = !pbd->hit;
pbd->seen = TRUE;
@@ -485,6 +492,9 @@ input_constrain_cursor(DeviceIntPtr dev,
int flags = 0;
pbd = GetBarrierDevice(c, master->id);
+ if (!pbd)
+ continue;
+
pbd->seen = FALSE;
if (!pbd->hit)
continue;
@@ -679,6 +689,9 @@ BarrierFreeBarrier(void *data, XID id)
continue;
pbd = GetBarrierDevice(c, dev->id);
+ if (!pbd)
+ continue;
+
if (!pbd->hit)
continue;
@@ -738,6 +751,8 @@ static void remove_master_func(void *res
barrier = container_of(b, struct PointerBarrierClient, barrier);
pbd = GetBarrierDevice(barrier, *deviceid);
+ if (!pbd)
+ return;
if (pbd->hit) {
BarrierEvent ev = {
@@ -903,6 +918,10 @@ ProcXIBarrierReleasePointer(ClientPtr cl
barrier = container_of(b, struct PointerBarrierClient, barrier);
pbd = GetBarrierDevice(barrier, dev->id);
+ if (!pbd) {
+ client->errorValue = dev->id;
+ return BadDevice;
+ }
if (pbd->barrier_event_id == event_id)
pbd->release_event_id = event_id;

View File

@ -1,59 +0,0 @@
From 10a24e364ac15983051d0bb90817c88bbe107036 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Tue, 17 Dec 2024 15:19:45 +0100
Subject: [PATCH xserver 1/2] composite: Handle failure to redirect in
compRedirectWindow()
The function compCheckRedirect() may fail if it cannot allocate the
backing pixmap.
In that case, compRedirectWindow() will return a BadAlloc error.
However that failure code path will shortcut the validation of the
window tree marked just before, which leaves the validate data partly
initialized.
That causes a use of uninitialized pointer later.
The fix is to not shortcut the call to compHandleMarkedWindows() even in
the case of compCheckRedirect() returning an error.
CVE-2025-26599, ZDI-CAN-25851
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Acked-by: Peter Hutterer <peter.hutterer@who-t.net>
---
composite/compalloc.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Index: xwayland-24.1.4/composite/compalloc.c
===================================================================
--- xwayland-24.1.4.orig/composite/compalloc.c
+++ xwayland-24.1.4/composite/compalloc.c
@@ -140,6 +140,7 @@ compRedirectWindow(ClientPtr pClient, Wi
CompScreenPtr cs = GetCompScreen(pWin->drawable.pScreen);
WindowPtr pLayerWin;
Bool anyMarked = FALSE;
+ int status = Success;
if (pWin == cs->pOverlayWin) {
return Success;
@@ -218,13 +219,13 @@ compRedirectWindow(ClientPtr pClient, Wi
if (!compCheckRedirect(pWin)) {
FreeResource(ccw->id, RT_NONE);
- return BadAlloc;
+ status = BadAlloc;
}
if (anyMarked)
compHandleMarkedWindows(pWin, pLayerWin);
- return Success;
+ return status;
}
void

View File

@ -1,121 +0,0 @@
From f5ce639ff9d3af05e79efce6c51e084352d28ed1 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 13 Jan 2025 16:09:43 +0100
Subject: [PATCH xserver 2/2] composite: initialize border clip even when
pixmap alloc fails
If it fails to allocate the pixmap, the function compAllocPixmap() would
return early and leave the borderClip region uninitialized, which may
lead to the use of uninitialized value as reported by valgrind:
Conditional jump or move depends on uninitialised value(s)
at 0x4F9B33: compClipNotify (compwindow.c:317)
by 0x484FC9: miComputeClips (mivaltree.c:476)
by 0x48559A: miValidateTree (mivaltree.c:679)
by 0x4F0685: MapWindow (window.c:2693)
by 0x4A344A: ProcMapWindow (dispatch.c:922)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Uninitialised value was created by a heap allocation
at 0x4841866: malloc (vg_replace_malloc.c:446)
by 0x4F47BC: compRedirectWindow (compalloc.c:171)
by 0x4FA8AD: compCreateWindow (compwindow.c:592)
by 0x4EBB89: CreateWindow (window.c:925)
by 0x4A2E6E: ProcCreateWindow (dispatch.c:768)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Conditional jump or move depends on uninitialised value(s)
at 0x48EEDBC: pixman_region_translate (pixman-region.c:2233)
by 0x4F9255: RegionTranslate (regionstr.h:312)
by 0x4F9B7E: compClipNotify (compwindow.c:319)
by 0x484FC9: miComputeClips (mivaltree.c:476)
by 0x48559A: miValidateTree (mivaltree.c:679)
by 0x4F0685: MapWindow (window.c:2693)
by 0x4A344A: ProcMapWindow (dispatch.c:922)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Uninitialised value was created by a heap allocation
at 0x4841866: malloc (vg_replace_malloc.c:446)
by 0x4F47BC: compRedirectWindow (compalloc.c:171)
by 0x4FA8AD: compCreateWindow (compwindow.c:592)
by 0x4EBB89: CreateWindow (window.c:925)
by 0x4A2E6E: ProcCreateWindow (dispatch.c:768)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Conditional jump or move depends on uninitialised value(s)
at 0x48EEE33: UnknownInlinedFun (pixman-region.c:2241)
by 0x48EEE33: pixman_region_translate (pixman-region.c:2225)
by 0x4F9255: RegionTranslate (regionstr.h:312)
by 0x4F9B7E: compClipNotify (compwindow.c:319)
by 0x484FC9: miComputeClips (mivaltree.c:476)
by 0x48559A: miValidateTree (mivaltree.c:679)
by 0x4F0685: MapWindow (window.c:2693)
by 0x4A344A: ProcMapWindow (dispatch.c:922)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Uninitialised value was created by a heap allocation
at 0x4841866: malloc (vg_replace_malloc.c:446)
by 0x4F47BC: compRedirectWindow (compalloc.c:171)
by 0x4FA8AD: compCreateWindow (compwindow.c:592)
by 0x4EBB89: CreateWindow (window.c:925)
by 0x4A2E6E: ProcCreateWindow (dispatch.c:768)
by 0x4A25B5: Dispatch (dispatch.c:560)
by 0x4B082A: dix_main (main.c:282)
by 0x429233: main (stubmain.c:34)
Fix compAllocPixmap() to initialize the border clip even if the creation
of the backing pixmap has failed, to avoid depending later on
uninitialized border clip values.
Related to CVE-2025-26599, ZDI-CAN-25851
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Acked-by: Peter Hutterer <peter.hutterer@who-t.net>
---
composite/compalloc.c | 11 ++++++++---
1 file changed, 8 insertions(+), 3 deletions(-)
Index: xwayland-24.1.4/composite/compalloc.c
===================================================================
--- xwayland-24.1.4.orig/composite/compalloc.c
+++ xwayland-24.1.4/composite/compalloc.c
@@ -606,9 +606,12 @@ compAllocPixmap(WindowPtr pWin)
int h = pWin->drawable.height + (bw << 1);
PixmapPtr pPixmap = compNewPixmap(pWin, x, y, w, h);
CompWindowPtr cw = GetCompWindow(pWin);
+ Bool status;
- if (!pPixmap)
- return FALSE;
+ if (!pPixmap) {
+ status = FALSE;
+ goto out;
+ }
if (cw->update == CompositeRedirectAutomatic)
pWin->redirectDraw = RedirectDrawAutomatic;
else
@@ -622,14 +625,16 @@ compAllocPixmap(WindowPtr pWin)
DamageRegister(&pWin->drawable, cw->damage);
cw->damageRegistered = TRUE;
}
+ status = TRUE;
+out:
/* Make sure our borderClip is up to date */
RegionUninit(&cw->borderClip);
RegionCopy(&cw->borderClip, &pWin->borderClip);
cw->borderClipX = pWin->drawable.x;
cw->borderClipY = pWin->drawable.y;
- return TRUE;
+ return status;
}
void

View File

@ -1,61 +0,0 @@
From 70ad5d36ae80f6e5a436eabfee642c2c013e51cc Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 16 Dec 2024 16:18:04 +0100
Subject: [PATCH xserver] dix: Dequeue pending events on frozen device on
removal
When a device is removed while still frozen, the events queued for that
device remain while the device itself is freed.
As a result, replaying the events will cause a use after free.
To avoid the issue, make sure to dequeue and free any pending events on
a frozen device when removed.
CVE-2025-26600, ZDI-CAN-25871
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
dix/devices.c | 18 ++++++++++++++++++
1 file changed, 18 insertions(+)
Index: xwayland-24.1.4/dix/devices.c
===================================================================
--- xwayland-24.1.4.orig/dix/devices.c
+++ xwayland-24.1.4/dix/devices.c
@@ -981,6 +981,23 @@ FreeAllDeviceClasses(ClassesPtr classes)
}
+static void
+FreePendingFrozenDeviceEvents(DeviceIntPtr dev)
+{
+ QdEventPtr qe, tmp;
+
+ if (!dev->deviceGrab.sync.frozen)
+ return;
+
+ /* Dequeue any frozen pending events */
+ xorg_list_for_each_entry_safe(qe, tmp, &syncEvents.pending, next) {
+ if (qe->device == dev) {
+ xorg_list_del(&qe->next);
+ free(qe);
+ }
+ }
+}
+
/**
* Close down a device and free all resources.
* Once closed down, the driver will probably not expect you that you'll ever
@@ -1045,6 +1062,7 @@ CloseDevice(DeviceIntPtr dev)
valuator_mask_free(&dev->last.touches[j].valuators);
free(dev->last.touches);
dev->config_info = NULL;
+ FreePendingFrozenDeviceEvents(dev);
dixFreePrivates(dev->devPrivates, PRIVATE_DEVICE);
free(dev);
}

View File

@ -1,66 +0,0 @@
From 573a2265aacfeaddcc1bb001905a6f7d4fa15ee6 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 20 Jan 2025 16:52:01 +0100
Subject: [PATCH xserver 1/4] sync: Do not let sync objects uninitialized
When changing an alarm, the change mask values are evaluated one after
the other, changing the trigger values as requested and eventually,
SyncInitTrigger() is called.
SyncInitTrigger() will evaluate the XSyncCACounter first and may free
the existing sync object.
Other changes are then evaluated and may trigger an error and an early
return, not adding the new sync object.
This can be used to cause a use after free when the alarm eventually
triggers.
To avoid the issue, delete the existing sync object as late as possible
only once we are sure that no further error will cause an early exit.
CVE-2025-26601, ZDI-CAN-25870
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
Xext/sync.c | 13 ++++++++-----
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/Xext/sync.c b/Xext/sync.c
index b6417b3b0..4267d3af6 100644
--- a/Xext/sync.c
+++ b/Xext/sync.c
@@ -330,11 +330,6 @@ SyncInitTrigger(ClientPtr client, SyncTrigger * pTrigger, XID syncObject,
client->errorValue = syncObject;
return rc;
}
- if (pSync != pTrigger->pSync) { /* new counter for trigger */
- SyncDeleteTriggerFromSyncObject(pTrigger);
- pTrigger->pSync = pSync;
- newSyncObject = TRUE;
- }
}
/* if system counter, ask it what the current value is */
@@ -402,6 +397,14 @@ SyncInitTrigger(ClientPtr client, SyncTrigger * pTrigger, XID syncObject,
}
}
+ if (changes & XSyncCACounter) {
+ if (pSync != pTrigger->pSync) { /* new counter for trigger */
+ SyncDeleteTriggerFromSyncObject(pTrigger);
+ pTrigger->pSync = pSync;
+ newSyncObject = TRUE;
+ }
+ }
+
/* we wait until we're sure there are no errors before registering
* a new counter on a trigger
*/
--
2.48.1

View File

@ -1,80 +0,0 @@
From 7dc3f11abb51cad8a59ecbff5278c8c8a318df41 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 20 Jan 2025 16:54:30 +0100
Subject: [PATCH xserver 2/4] sync: Check values before applying changes
In SyncInitTrigger(), we would set the CheckTrigger function before
validating the counter value.
As a result, if the counter value overflowed, we would leave the
function SyncInitTrigger() with the CheckTrigger applied but without
updating the trigger object.
To avoid that issue, move the portion of code checking for the trigger
check value before updating the CheckTrigger function.
Related to CVE-2025-26601, ZDI-CAN-25870
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
Xext/sync.c | 36 ++++++++++++++++++------------------
1 file changed, 18 insertions(+), 18 deletions(-)
diff --git a/Xext/sync.c b/Xext/sync.c
index 4267d3af6..4eab5a6ac 100644
--- a/Xext/sync.c
+++ b/Xext/sync.c
@@ -351,6 +351,24 @@ SyncInitTrigger(ClientPtr client, SyncTrigger * pTrigger, XID syncObject,
}
}
+ if (changes & (XSyncCAValueType | XSyncCAValue)) {
+ if (pTrigger->value_type == XSyncAbsolute)
+ pTrigger->test_value = pTrigger->wait_value;
+ else { /* relative */
+ Bool overflow;
+
+ if (pCounter == NULL)
+ return BadMatch;
+
+ overflow = checked_int64_add(&pTrigger->test_value,
+ pCounter->value, pTrigger->wait_value);
+ if (overflow) {
+ client->errorValue = pTrigger->wait_value >> 32;
+ return BadValue;
+ }
+ }
+ }
+
if (changes & XSyncCATestType) {
if (pSync && SYNC_FENCE == pSync->type) {
@@ -379,24 +397,6 @@ SyncInitTrigger(ClientPtr client, SyncTrigger * pTrigger, XID syncObject,
}
}
- if (changes & (XSyncCAValueType | XSyncCAValue)) {
- if (pTrigger->value_type == XSyncAbsolute)
- pTrigger->test_value = pTrigger->wait_value;
- else { /* relative */
- Bool overflow;
-
- if (pCounter == NULL)
- return BadMatch;
-
- overflow = checked_int64_add(&pTrigger->test_value,
- pCounter->value, pTrigger->wait_value);
- if (overflow) {
- client->errorValue = pTrigger->wait_value >> 32;
- return BadValue;
- }
- }
- }
-
if (changes & XSyncCACounter) {
if (pSync != pTrigger->pSync) { /* new counter for trigger */
SyncDeleteTriggerFromSyncObject(pTrigger);
--
2.48.1

View File

@ -1,47 +0,0 @@
From 4ccaa5134482b6be9c9a7f0b66cd221ef325d082 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 20 Jan 2025 17:06:07 +0100
Subject: [PATCH xserver 3/4] sync: Do not fail SyncAddTriggerToSyncObject()
We do not want to return a failure at the very last step in
SyncInitTrigger() after having all changes applied.
SyncAddTriggerToSyncObject() must not fail on memory allocation, if the
allocation of the SyncTriggerList fails, trigger a FatalError() instead.
Related to CVE-2025-26601, ZDI-CAN-25870
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
Xext/sync.c | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/Xext/sync.c b/Xext/sync.c
index 4eab5a6ac..c36de1a2e 100644
--- a/Xext/sync.c
+++ b/Xext/sync.c
@@ -200,8 +200,8 @@ SyncAddTriggerToSyncObject(SyncTrigger * pTrigger)
return Success;
}
- if (!(pCur = malloc(sizeof(SyncTriggerList))))
- return BadAlloc;
+ /* Failure is not an option, it's succeed or burst! */
+ pCur = XNFalloc(sizeof(SyncTriggerList));
pCur->pTrigger = pTrigger;
pCur->next = pTrigger->pSync->pTriglist;
@@ -409,8 +409,7 @@ SyncInitTrigger(ClientPtr client, SyncTrigger * pTrigger, XID syncObject,
* a new counter on a trigger
*/
if (newSyncObject) {
- if ((rc = SyncAddTriggerToSyncObject(pTrigger)) != Success)
- return rc;
+ SyncAddTriggerToSyncObject(pTrigger);
}
else if (pCounter && IsSystemCounter(pCounter)) {
SyncComputeBracketValues(pCounter);
--
2.48.1

View File

@ -1,128 +0,0 @@
From f0984082067f79b45383fa1eb889c6a901667331 Mon Sep 17 00:00:00 2001
From: Olivier Fourdan <ofourdan@redhat.com>
Date: Mon, 20 Jan 2025 17:10:31 +0100
Subject: [PATCH xserver 4/4] sync: Apply changes last in
SyncChangeAlarmAttributes()
SyncChangeAlarmAttributes() would apply the various changes while
checking for errors.
If one of the changes triggers an error, the changes for the trigger,
counter or delta value would remain, possibly leading to inconsistent
changes.
Postpone the actual changes until we're sure nothing else can go wrong.
Related to CVE-2025-26601, ZDI-CAN-25870
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
---
Xext/sync.c | 42 +++++++++++++++++++++++++++---------------
1 file changed, 27 insertions(+), 15 deletions(-)
diff --git a/Xext/sync.c b/Xext/sync.c
index c36de1a2e..e282e6657 100644
--- a/Xext/sync.c
+++ b/Xext/sync.c
@@ -800,8 +800,14 @@ SyncChangeAlarmAttributes(ClientPtr client, SyncAlarm * pAlarm, Mask mask,
int status;
XSyncCounter counter;
Mask origmask = mask;
+ SyncTrigger trigger;
+ Bool select_events_changed = FALSE;
+ Bool select_events_value;
+ int64_t delta;
- counter = pAlarm->trigger.pSync ? pAlarm->trigger.pSync->id : None;
+ trigger = pAlarm->trigger;
+ delta = pAlarm->delta;
+ counter = trigger.pSync ? trigger.pSync->id : None;
while (mask) {
int index2 = lowbit(mask);
@@ -817,24 +823,24 @@ SyncChangeAlarmAttributes(ClientPtr client, SyncAlarm * pAlarm, Mask mask,
case XSyncCAValueType:
mask &= ~XSyncCAValueType;
/* sanity check in SyncInitTrigger */
- pAlarm->trigger.value_type = *values++;
+ trigger.value_type = *values++;
break;
case XSyncCAValue:
mask &= ~XSyncCAValue;
- pAlarm->trigger.wait_value = ((int64_t)values[0] << 32) | values[1];
+ trigger.wait_value = ((int64_t)values[0] << 32) | values[1];
values += 2;
break;
case XSyncCATestType:
mask &= ~XSyncCATestType;
/* sanity check in SyncInitTrigger */
- pAlarm->trigger.test_type = *values++;
+ trigger.test_type = *values++;
break;
case XSyncCADelta:
mask &= ~XSyncCADelta;
- pAlarm->delta = ((int64_t)values[0] << 32) | values[1];
+ delta = ((int64_t)values[0] << 32) | values[1];
values += 2;
break;
@@ -844,10 +850,8 @@ SyncChangeAlarmAttributes(ClientPtr client, SyncAlarm * pAlarm, Mask mask,
client->errorValue = *values;
return BadValue;
}
- status = SyncEventSelectForAlarm(pAlarm, client,
- (Bool) (*values++));
- if (status != Success)
- return status;
+ select_events_value = (Bool) (*values++);
+ select_events_changed = TRUE;
break;
default:
@@ -856,25 +860,33 @@ SyncChangeAlarmAttributes(ClientPtr client, SyncAlarm * pAlarm, Mask mask,
}
}
+ if (select_events_changed) {
+ status = SyncEventSelectForAlarm(pAlarm, client, select_events_value);
+ if (status != Success)
+ return status;
+ }
+
/* "If the test-type is PositiveComparison or PositiveTransition
* and delta is less than zero, or if the test-type is
* NegativeComparison or NegativeTransition and delta is
* greater than zero, a Match error is generated."
*/
if (origmask & (XSyncCADelta | XSyncCATestType)) {
- if ((((pAlarm->trigger.test_type == XSyncPositiveComparison) ||
- (pAlarm->trigger.test_type == XSyncPositiveTransition))
- && pAlarm->delta < 0)
+ if ((((trigger.test_type == XSyncPositiveComparison) ||
+ (trigger.test_type == XSyncPositiveTransition))
+ && delta < 0)
||
- (((pAlarm->trigger.test_type == XSyncNegativeComparison) ||
- (pAlarm->trigger.test_type == XSyncNegativeTransition))
- && pAlarm->delta > 0)
+ (((trigger.test_type == XSyncNegativeComparison) ||
+ (trigger.test_type == XSyncNegativeTransition))
+ && delta > 0)
) {
return BadMatch;
}
}
/* postpone this until now, when we're sure nothing else can go wrong */
+ pAlarm->delta = delta;
+ pAlarm->trigger = trigger;
if ((status = SyncInitTrigger(client, &pAlarm->trigger, counter, RTCounter,
origmask & XSyncCAAllTrigger)) != Success)
return status;
--
2.48.1

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:bef21c4f18807a4ed571c4e2df60ab63b5466bbd502ecceb2485b892ab76dcc2
size 1301180

Binary file not shown.

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:7125bee0b10335805d7f5ba57dfaa359a7850af1a68524f1d97b362741a51832
size 1301652

Binary file not shown.

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:dcdb57a66cc9b124c8f936760592628ac4e744a7d7b3179aa86189ad7ea4cb10
size 1302164

Binary file not shown.

BIN
xwayland-24.1.4.tar.xz (Stored with Git LFS)

Binary file not shown.

Binary file not shown.

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:cb4bd170e6fa6b545ba0567be8f693d2eeccfc62d04c67037dd14f06daad361d
size 1302484

Binary file not shown.