pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/x11/libXext Fixes from GIT:



details:   https://anonhg.NetBSD.org/pkgsrc/rev/10b1bb500d06
branches:  trunk
changeset: 538106:10b1bb500d06
user:      bjs <bjs%pkgsrc.org@localhost>
date:      Tue Jan 29 02:00:21 2008 +0000

description:
Fixes from GIT:

- XeviGetVisualInfo: check for null pointer before writing to it, not after
- Coverity #467: security_error_list has fewer than XSecurityNumberErrors
  entries

- Fix misc. warnings.

Bump rev.

diffstat:

 x11/libXext/Makefile         |   3 ++-
 x11/libXext/distinfo         |   8 +++++++-
 x11/libXext/patches/patch-aa |  21 +++++++++++++++++++++
 x11/libXext/patches/patch-ab |  16 ++++++++++++++++
 x11/libXext/patches/patch-ac |  24 ++++++++++++++++++++++++
 x11/libXext/patches/patch-ad |  15 +++++++++++++++
 x11/libXext/patches/patch-ae |  30 ++++++++++++++++++++++++++++++
 x11/libXext/patches/patch-af |  15 +++++++++++++++
 8 files changed, 130 insertions(+), 2 deletions(-)

diffs (174 lines):

diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/Makefile
--- a/x11/libXext/Makefile      Tue Jan 29 01:13:00 2008 +0000
+++ b/x11/libXext/Makefile      Tue Jan 29 02:00:21 2008 +0000
@@ -1,7 +1,8 @@
-# $NetBSD: Makefile,v 1.3 2007/07/03 13:35:49 joerg Exp $
+# $NetBSD: Makefile,v 1.4 2008/01/29 02:00:21 bjs Exp $
 #
 
 DISTNAME=              libXext-1.0.3
+PKGREVISION=           1
 CATEGORIES=            x11 devel
 MASTER_SITES=          http://xorg.freedesktop.org/releases/individual/lib/
 EXTRACT_SUFX=          .tar.bz2
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/distinfo
--- a/x11/libXext/distinfo      Tue Jan 29 01:13:00 2008 +0000
+++ b/x11/libXext/distinfo      Tue Jan 29 02:00:21 2008 +0000
@@ -1,5 +1,11 @@
-$NetBSD: distinfo,v 1.2 2007/02/26 14:58:18 joerg Exp $
+$NetBSD: distinfo,v 1.3 2008/01/29 02:00:21 bjs Exp $
 
 SHA1 (libXext-1.0.3.tar.bz2) = 341796c502d0076912b090f0ac6a764501800684
 RMD160 (libXext-1.0.3.tar.bz2) = 375041cf7b89d2130a38200122ab3f27ef3ca5fd
 Size (libXext-1.0.3.tar.bz2) = 262116 bytes
+SHA1 (patch-aa) = 3d8b3a3236a7b23d91c541bb2da5fac28a34ecfa
+SHA1 (patch-ab) = e48c5005eeaff5d6664c47f9d80339bfd965356a
+SHA1 (patch-ac) = 23374cc6243334f360c265ca7abe83ae2e6d1a81
+SHA1 (patch-ad) = d9e670932c4ddcbb3cac5c9d32df9627473259ca
+SHA1 (patch-ae) = 801927abe502d3c6e250d1edd8805f27d55dedad
+SHA1 (patch-af) = 8f970ba7e514c7a9a824f32824c9c2a6f0d61b8d
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-aa
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-aa      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,21 @@
+$NetBSD: patch-aa,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+XeviGetVisualInfo: check for null pointer before writing to it, not after
+
+--- src/XEVI.c.orig    2006-07-11 14:05:14.000000000 -0400
++++ src/XEVI.c
+@@ -117,10 +117,13 @@ Status XeviGetVisualInfo(
+     register int n_data, visualIndex, vinfoIndex;
+     Bool isValid;
+     XeviCheckExtension (dpy, info, 0);
++    if (!n_info_return || !evi_return) {
++      return BadValue;
++    }
+     *n_info_return = 0;
+     *evi_return = NULL;
+     vinfo = XGetVisualInfo(dpy, 0, NULL, &sz_info);
+-    if (!vinfo || !evi_return) {
++    if (!vinfo) {
+       return BadValue;
+     }
+     if (!n_visual || !visual) {               /* copy the all visual */
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-ab
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-ab      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,16 @@
+$NetBSD: patch-ab,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+Coverity #467: security_error_list has fewer than 
+XSecurityNumberErrors entries
+
+--- src/XSecurity.c.orig       2006-07-11 14:05:14.000000000 -0400
++++ src/XSecurity.c
+@@ -78,7 +78,7 @@ static XExtensionHooks Security_extensio
+ };
+ 
+ static char    *security_error_list[] = {
+-    "BadAuthorization"
++    "BadAuthorization",
+     "BadAuthorizationProtocol"
+ };
+ 
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-ac
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-ac      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,24 @@
+$NetBSD: patch-ac,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+Fix warnings.
+
+--- src/XShape.c.orig  2006-07-11 14:05:14.000000000 -0400
++++ src/XShape.c
+@@ -461,7 +461,7 @@ XRectangle *XShapeGetRectangles (
+     }
+     *count = rep.nrects;
+     *ordering = rep.ordering;
+-    rects = 0;
++    rects = NULL;
+     if (*count) {
+       xrects = (xRectangle *) Xmalloc (*count * sizeof (xRectangle));
+       rects = (XRectangle *) Xmalloc (*count * sizeof (XRectangle));
+@@ -471,7 +471,7 @@ XRectangle *XShapeGetRectangles (
+           if (rects)
+               Xfree (rects);
+           _XEatData (dpy, *count * sizeof (xRectangle));
+-          rects = 0;
++          rects = NULL;
+           *count = 0;
+       } else {
+           _XRead (dpy, (char *) xrects, *count * sizeof (xRectangle));
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-ad
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-ad      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,15 @@
+$NetBSD: patch-ad,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+Fix warnings.
+
+--- src/XTestExt1.c.orig       2006-07-11 14:05:14.000000000 -0400
++++ src/XTestExt1.c
+@@ -1200,7 +1200,7 @@ int      ack_flag)
+       /*
+        * points to XTestIdentifyMyEvent
+        */
+-      Bool    (*func_ptr)();
++      Bool    (*func_ptr)(Display *, XEvent *, XPointer);
+ 
+       /*
+        * write the input actions to the server
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-ae
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-ae      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,30 @@
+$NetBSD: patch-ae,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+Fix warnings.
+
+--- src/extutil.c.orig 2006-07-11 14:05:14.000000000 -0400
++++ src/extutil.c
+@@ -248,11 +248,11 @@ static int _default_exterror (Display *d
+  * requested extension is referenced.  This should eventually move into Xlib.
+  */
+ 
+-extern int (*_XExtensionErrorFunction)();
++extern int (*_XExtensionErrorFunction)(Display*, char *, char * );
+ 
+-int (*XSetExtensionErrorHandler(int (*handler)(Display*, char *, char * )))()
++int (*XSetExtensionErrorHandler(int (*handler)(Display*, char *, char * )))(Display*, char *, char * )
+ {
+-    int (*oldhandler)() = _XExtensionErrorFunction;
++    int (*oldhandler)(Display*, char *, char * ) = _XExtensionErrorFunction;
+ 
+     _XExtensionErrorFunction = (handler ? handler :
+                               _default_exterror);
+@@ -265,7 +265,7 @@ int (*XSetExtensionErrorHandler(int (*ha
+  */
+ int XMissingExtension (Display *dpy, _Xconst char *ext_name)
+ {
+-    int (*func)() = (_XExtensionErrorFunction ?
++    int (*func)(Display*, char *, char *) = (_XExtensionErrorFunction ?
+                    _XExtensionErrorFunction : _default_exterror);
+ 
+     if (!ext_name) ext_name = X_EXTENSION_UNKNOWN;
diff -r 9e7a6b18d839 -r 10b1bb500d06 x11/libXext/patches/patch-af
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/x11/libXext/patches/patch-af      Tue Jan 29 02:00:21 2008 +0000
@@ -0,0 +1,15 @@
+$NetBSD: patch-af,v 1.1 2008/01/29 02:00:22 bjs Exp $
+
+Fix warnings.
+
+--- src/globals.c.orig 2006-07-11 14:05:14.000000000 -0400
++++ src/globals.c
+@@ -75,7 +75,7 @@ from The Open Group.
+ /*
+  * Error handlers; used to be in XlibInt.c
+  */
+-typedef int (*funcptr)();
++typedef int (*funcptr)(Display*, char *, char *);
+ ZEROINIT (funcptr, _XExtensionErrorFunction, NULL);
+ 
+ /*



Home | Main Index | Thread Index | Old Index