SGI Logo
 
 

Patch 3163 : Multiple fixes for X libraries : [IRIX 6.2]
INDEX

  • Relations
  • Release Notes
  • Inst Subsystem Requirements
  • Inst Subsystem Checksums
  • Inst Subsystem File Listings
  • Download Patch


    RELATIONS

    This patch replaces the following patches:
    1234, 1350, 1398, 1428, 1470, 1585, 1746, 2026, 2154, 2580

    This patch is incompatible with the following patches:
    1915, 2226, 2562, 2748

    This patch fixes the following bugs:
    353344 - 6.2Beta2: Problem in n32 mips3 _XInternAtom.
    365702 - X Library doesn't support KOI8
    377695 - Russian Keymap Needs Work
    380848 - Resource to specify the desk an application appears in
    381248 - KOI8 support: Switching keymaps produces residual characters.
    381257 - KOI8 support: Caps lock sends ^A (and kills iwsh)
    383796 - patch1349 has a problem with Korean and Chinese environment.
    390471 - showcase does not work with patch1398 on Korean and Chinese env.
    400963 - Xlib creates wrong CompoundText for the Cut&Paste
    430277 - libX11 big5 support.
    430290 - xwnmo sets wrong locale
    433544 - 5.3 app fails on 6.2 when LD_BIND_NOW set: libXt needs libcvt.so
    439052 - XmImSetValues leaks memory
    463094 - APP CATIA keypad loosing modifiers with french kbd
    488823 - Disconnected to IM when SIGARLM comes.
    493564 - Security Vulnerability in libXt
    495591 - xconsole has buffer overrun security issue
    496885 - Security issues with X11 localization
    518036 - possible buffer overflow in X11
    519535 - IRIX6.2 doesn't support Turkish locale and keyboard.
    523684 - XtOwnSelectionIncremental fails in 6.2 and 6.3
    530669 - /usr/bin/X11/xconsole buffer overrun
    530672 - /usr/bin/X11/xload buffer overrun
    537721 - Problem in 64 _XInternAtom.
    543320 - Buffer overrun in x/xc/lib/X11/omGeneric.c
    600686 - Security: Xaw: exploitable buffer overflow
    600690 - Security: Xt: potential buffer overflows
    607710 - Xlib: exploitable buffer overflow in XGetPointerMapping
    608693 - Xlib: potential buffer overflows in XKB
    608806 - Xlib: potential buffer overflow in OpenIM
    608998 - Xlib: potential buffer overflow in call to _XlcMapOSLocaleName
    609039 - Xt: potential buffer overflow in call to ExtractLocaleName
    609085 - Xlib: potential buffer overflow in input method resource fetch
    609104 - Xt: potential buffer overflow, array bounds write error
    609236 - XtMalloc default error handler calls XtMalloc again 6.2-6.5
    614197 - Xlib: exploitable buffer overflow in XLC_LOCALE database parser
    615810 - Memory corruption in libX11
    625464 - Xlib: potential buffer overflow in Compose file parsing
    627136 - libXmu: buffer overflows (security)
    627441 - Xaw: buffer overflows (security vulnerability)
    627543 - Xmu: potential buffer overflow in XmuCvtStringToCursor
    627631 - Xlib: potentially exploitable buffer overflows in XLC_LOCALE db parser
                    

    628917 - Xlib: buffer overflows in XLC_LOCALE initialization
    628942 - Xlib: buffer overflows in fontset creation


    RELEASE NOTES

    1. Patch SG0003163 Release Note

           This release note describes patch SG0003163 to IRIX 6.2.
           Patch SG0003163 replaces patches SG0001234, SG0001350,
           SG0001398, SG0001428, SG0001470, SG0001585, SG0001746,
           SG0002026, SG0002154 and SG0002580.
    
    
    1.1 Supported Hardware Platforms
           This patch contains bug fixes for all platforms.
    
    
    1.2 Supported Software Platforms
           This patch contains bug fixes for the X11 Execution
           Environment on a system running IRIX 6.2 (version
           1232792130) or IRIX 6.2 with Indigo2 Impact 10000 (version
           1233007720).  The software cannot be installed on other
           configurations.
    
    
    1.3 Bugs Fixed by Patch SG0003163
           This patch contains fixes for the following bugs in IRIX
           6.2.  Bug numbers from Silicon Graphics bug tracking system
           are included for reference.
    
              o Buffer overflows in the Xaw library may provide an
                exploitable security hole.  (Bug #600686, #627441)
    
              o Buffer overflows in the Xt library may provide an
                exploitable security hole.  (Bugs #600690, #609039,
                #609104)
    
              o Buffer overflows in the X11 library may provide an
                exploitable security hole.  (Bugs #607710, #608693,
                #608806, #608998, #609085, #614197, #625464, #627631,
                #628917, #628942)
    
              o XtMalloc may be called in response to XtMalloc errors,
                leading to a fatal recursion.  (Bug #609236)
    
              o Free of non-allocated memory in libX11.  (Bug #615810)
    
              o Buffer overflows in the Xmu library may provide an
                exploitable security hole.  (Bug #627136, #627543)
    
    
    
    1.4 Bugs Fixed by Patch SG0002580
           Patch SG0003163 also includes the bug fixes from Patch
           SG0002580.
    
              o IRIX6.2 doesn't support Turkish locale and keyboard.
                (Bug #519535) (This patch fixes only keyboard stuff for
                the bug.)
    
              o XtOwnSelectionIncremental fails. (Bug #523684)
    
              o Buffer overflow in Xrm code. (Bug #530669)
    
              o Buffer overflow in Xt default error handler. (Bug
                #530672)
    
              o XInternAtom() generates bad X request in the 64 bit
                library. (Bug #537721)
    
              o Buffer overflow in X library font name parsing. (Bug
                #543320)
    
    
    1.5 Bugs Fixed by Patch SG0002154
           Patch SG0003163 also includes the bug fixes from Patch
           SG0002154.
    
              o dlopen("libXt.so", RTLD_NOW) results in a fatal runtime
                error, with an unresolved external symbol
                SgCvtCreateConversionContext. (Bug #433544)
    
              o XCreateIC leaks memory. (Bug #439052)
    
              o Applications which generate signals such as SIGARLM may
                lose connection to IM server. (Bug #488823)
    
              o Security vulnerability in libXt (Bug #493564)
    
              o Buffer overflow allows unprivileged users to get root
                access through setuid X programs. (Bug #495591)
    
              o Buffer overflows possible in libX11
                internationalization code.  (Bug #496885)
    
              o Potential buffer overflow in XGetErrorDatabaseText.
                (Bug #518036)
    
    
    
    1.6 Bugs Fixed by Patch SG0001585
           Patch SG0003163 also includes the bug fixes from Patch
           SG0001585.  Patch SG0001585 includes the bug fixes from
           patches SG0001234, SG0001398, SG0001428, SG0001470.
    
              o A call to XInternAtom passing a non-existent atom
                generates an X request with a length of -1.  This
                causes an X Bad Length error and a subsequent crash of
                the application.  (Bug #353344)
    
              o The X library does not include a converter which goes
                from X keysyms to KOI8 characters.  Without this
                converter, XmbLookupString and XwcLookupString cannot
                be used in a locale which uses the KOI8 character set,
                effectively making it impossible to use.  This patch
                also adds a locale directory entry for the KOI8-based X
                locale.  (Bug #365702)
    
              o Update the Russian keymap to make group lock available
                by pressing both shift keys simultaneously. (Bug
                #377695)
    
              o Extra characters are generated when the group is
                changed by pressing both shift keys in the KOI-8-based
                Russian locale. (Bug #381248)
    
              o iwsh is sometimes killed when caps lock is pressed
                while using the KOI-8-based Russian locale. (Bug
                #381257)
    
              o XIM server displays '$' on the textfield. (Bug #383796)
    
              o Showcase does not work with patch1398. (Bug #390471)
    
              o Xlib creates wrong CompoundText for Cut&Paste due to an
                SJIS to CompoundText converter problem. (Bug #400963)
    
              o Add big5 support to libX11. (Bug #430277)
    
              o xwnmo sets wrong locale with big5 locale. (Bug #430290)
    
    
    1.7 Bugs Fixed by Patch SG0001746
           Patch SG0003163 also includes the bug fixes from Patch
           SG0001746.
    
              o A call to XInternAtom passing a non-existent atom
                generates an X request with a length of -1.  This
                causes an X Bad Length error and a subsequent crash of
                the application.  (Bug #353344)
    
    
    
    1.8 Bugs Fixed by Patch SG0002026
           Patch SG0003163 also includes the bug fixes from Patch
           SG0002026.  Patch SG0002026 includes the bug fixes from
           Patch SG0001350.
    
              o Add support for a new Xt resource that specifies the
                desks an application appears in. (Bug #380848)
    
              o Some keypad keys activate the wrong text widget
                translations when NumLock is enabled.  This only
                happens when the user is using a keyboard mapping with
                four keysyms per keycode (common with European
                keyboards). (Bug #463094)
    
    
    1.9 Subsystems Included in Patch SG0003163
           This patch release includes these subsystems:
    
              o patchSG0003163.x_eoe_sw.Server
    
              o patchSG0003163.x_eoe_sw.eoe
    
              o patchSG0003163.x_eoe_sw32.eoe
    
              o patchSG0003163.x_eoe_sw64.eoe
    
              o patchSG0003163.x_dev_sw.dev
    
              o patchSG0003163.x_dev_sw32.dev
    
              o patchSG0003163.x_dev_sw64.dev
    
    
    1.10 Installation Instructions
           Because you want to install only the patches for problems
           you have encountered, patch software is not installed by
           default.  After reading the descriptions of the bugs fixed
           in this patch (see Section 1.3), determine the patches that
           meet your specific needs.
    
           If, after reading Sections 1.1 and 1.2 of these release
           notes, you are unsure whether your hardware and software
           meet the requirements for installing a particular patch, run
           inst.  The inst program does not allow you to install
           patches that are incompatible with your hardware or
           software.
    
           Patch software is installed like any other Silicon Graphics
           software product.  Follow the instructions in your Software
    
    
           Installation Administrator's Guide to bring up the miniroot
           form of the software installation tools.
    
           Follow these steps to select a patch for installation:
    
             1.  At the Inst> prompt, type
    
                 install patchSGxxxxxxx
    
                 where xxxxxxx is the patch number.
    
             2.  Initiate the installation sequence. Type
    
                 Inst> go
    
             3.  You may find that two patches have been marked as
                 incompatible.  (The installation tools reject an
                 installation request if an incompatibility is
                 detected.)  If this occurs, you must deselect one of
                 the patches.
    
                 Inst> keep patchSGxxxxxxx
    
                 where xxxxxxx is the patch number.
    
             4.  After completing the installation process, exit the
                 inst program by typing
    
                 Inst> quit
    
    
    1.11 Patch Removal Instructions
           To remove a patch, use the versions remove command as you
           would for any other software subsystem.  The removal process
           reinstates the original version of software unless you have
           specifically removed the patch history from your system.
    
           versions remove patchSGxxxxxxx
    
           where xxxxxxx is the patch number.
    
           To keep a patch but increase your disk space, use the
           versions removehist command to remove the patch history.
    
           versions removehist patchSGxxxxxxx
    
           where xxxxxxx is the patch number.
    
    
    
    1.12 Known Problems
           This patch fixes only keyboard stuff for the Bug #519535
            (IRIX6.2 doesn't support Turkish locale and keyboard).
    
    

    INST SUBSYSTEM REQUIREMENTS
    No Requirements Information Available.
    

    INST SUBSYSTEM CHECKSUMS

    These checksums help to provide a 'signature' for the patch inst image which can be used to authenticate other inst images. You can obtain this kind of output by running sum -r on the image (from the command line):

    28764   2195   patchSG0003163.x_dev_sw32
    36394   4235   patchSG0003163.x_eoe_sw64
    44792   3969   patchSG0003163.x_eoe_sw32
    26523   4258   patchSG0003163.x_eoe_sw
    16114     13   patchSG0003163.idb
    26703   1871   patchSG0003163.x_dev_sw
    23654     18 patch/README.patch.3163
    32763     18   patchSG0003163
    

    INST SUBSYSTEM FILE LISTINGS

    The following lists the files which get installed from each subsystem in the patch:

    patchSG0003163.x_dev_sw.dev
    usr/include/X11/Xaw/AsciiSrcP.h
    usr/include/X11/Xaw/MultiSrcP.h
    usr/lib/libXaw.a
    usr/lib/libXmu.a
    usr/lib/libXt.a

    patchSG0003163.x_dev_sw32.dev
    usr/lib32/libXaw.a
    usr/lib32/libXmu.a
    usr/lib32/libXt.a

    patchSG0003163.x_dev_sw64.dev
    usr/lib64/libXaw.a
    usr/lib64/libXmu.a
    usr/lib64/libXt.a

    patchSG0003163.x_eoe_sw.Server
    usr/lib/X11/input/PC/RU.xkm
    usr/lib/X11/input/PC/RU_typewriter.xkm
    usr/lib/X11/input/PC/TR.xkm
    usr/lib/X11/input/SGI/RU.xkm
    usr/lib/X11/input/SGI/RU_typewriter.xkm
    usr/lib/X11/input/SGI/TR.xkm
    usr/relnotes/patchSG0003163/TC
    usr/relnotes/patchSG0003163/ch1.z

    patchSG0003163.x_eoe_sw.eoe
    usr/bin/X11/xwnmo
    usr/lib/X11/locale/locale.dir
    usr/lib/X11/locale/zh_TW.big5/XLC_LOCALE
    usr/lib/X11/xkb/keymap/sgi_ru
    usr/lib/X11/xkb/symbols/group
    usr/lib/X11/xkb/symbols/ru
    usr/lib/X11/xkb/symbols/tr
    usr/lib/libX11.so.1
    usr/lib/libXaw.so.2
    usr/lib/libXaw.so.2
    usr/lib/libXmu.so
    usr/lib/libXt.so

    patchSG0003163.x_eoe_sw32.eoe
    usr/lib32/libX11.so.1
    usr/lib32/libXaw.so.2
    usr/lib32/libXaw.so.2
    usr/lib32/libXmu.so
    usr/lib32/libXt.so

    patchSG0003163.x_eoe_sw64.eoe
    usr/lib64/libX11.so.1
    usr/lib64/libXaw.so.2
    usr/lib64/libXaw.so.2
    usr/lib64/libXmu.so
    usr/lib64/libXt.so


    DOWNLOAD PATCH
    Download Server File Name Date Added Size Download
    download.sgi.com patchSG0003163.tar 06-Oct-1998 9.3 Mb FTP HTTP Add to download cart 
    download.sgi.com patchSG0003163.tardist 06-Oct-1998 9.3 Mb FTP HTTP
     
    FTP = download using FTP protocol
    HTTP = download using HTTP protocol
    Add to shopping list= store in your basket for downloading later
  •  


    Document Id: 20021117071946-IRIXPatch-1245