Age | Commit message (Collapse) | Author | Lines | |
---|---|---|---|---|
2017-08-21 | Release v2.19.32.19.3 | Daniel Friesel | -1/+1 | |
2017-08-19 | Make feh abort immediately if an index image could not be created (#306) | Daniel Friesel | -4/+7 | |
2017-08-19 | Save --geometry flags in .fehbg if specified (closes #313) | Daniel Friesel | -2/+16 | |
2017-08-12 | Release v2.19.22.19.2 | Daniel Friesel | -1/+1 | |
2017-08-10 | Fix segfault in feh_event_handle_keypress for certain key inputs | Daniel Friesel | -2/+11 | |
Turns out that it is undefined behaviour to pass a value to isctype functions which does not fit inside a char. Closes #312 | ||||
2017-08-05 | Show ImageMagick output on the terminal unless --quiet is specified | Daniel Friesel | -3/+5 | |
(cf #309) | ||||
2017-06-19 | Fix Shift modifier not being recognized for tab, space and similar keys | Daniel Friesel | -2/+2 | |
Closes #303 | ||||
2017-04-16 | Thumbnail generation: Handle HOME-less users (and some other edge cases) | Daniel Friesel | -2/+12 | |
2017-04-06 | Fix indentation. | Olof-Joachim Frahm | -6/+6 | |
2017-04-05 | Use temporary file to create thumbnail. | Olof-Joachim Frahm | -6/+18 | |
2017-04-05 | `sizeof(char)` is defined to be 1. | Olof-Joachim Frahm | -1/+1 | |
2017-04-05 | Use XDG_CACHE_HOME for thumbnails. | Olof-Joachim Frahm | -22/+45 | |
2017-04-02 | replace _emalloc with emalloc (is the same unless DMALLOC is used) | Daniel Friesel | -2/+2 | |
2017-04-02 | Merge pull request #290 from stoeckmann/emalloc | Daniel Friesel | -1/+1 | |
Check malloc return value for NULL. | ||||
2017-04-02 | Merge pull request #289 from stoeckmann/memory-leak | Daniel Friesel | -0/+2 | |
Fixed memory leak on file name collision. | ||||
2017-04-02 | Merge pull request #288 from stoeckmann/strncpy | Daniel Friesel | -6/+12 | |
Always terminate strncpy results with '\0'. | ||||
2017-04-02 | Check malloc return value for NULL. | Tobias Stoeckmann | -1/+1 | |
If malloc cannot allocate enough memory, it could return NULL. This is not necessarily true for default Linux settings, but can be provoked there as well by adjusting proc entries. Other systems like the *BSD ones definitely do this. The function _emalloc exists for exactly this purpose, so use it instead of calling malloc directly. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | ||||
2017-04-02 | Fixed memory leak on file name collision. | Tobias Stoeckmann | -0/+2 | |
If feh_unique_filename encounters a file that already exists, the memory for the temporary filename is not released. As this happens in /tmp at some code places, an attacker could use this to spray the memory of feh, or simply triggering an out of memory condition. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | ||||
2017-04-02 | Avoid out of boundary read on empty/broken file. | Tobias Stoeckmann | -2/+2 | |
If ereadfile encounters an empty file or the file could not be read, an out ouf boundary read (and possible write) occurs. Always check the return value of fread to be > 0 before processing the result buffer. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | ||||
2017-04-02 | Always terminate strncpy results with '\0'. | Tobias Stoeckmann | -6/+12 | |
The strncpy function does not guarantee to end the resulting character sequence with a terminating nul character if not enough space is available. This could be triggered by supplying a sufficiently long output_file option. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | ||||
2017-03-23 | Fix double-free/OOB-write while receiving IPC data | Tobias Stoeckmann | -1/+1 | |
If a malicious client pretends to be the E17 window manager, it is possible to trigger an out of boundary heap write while receiving an IPC message. The length of the already received message is stored in an unsigned short, which overflows after receiving 64 KB of data. It's comparably small amount of data and therefore achievable for an attacker. When len overflows, realloc() will either be called with a small value and therefore chars will be appended out of bounds, or len + 1 will be exactly 0, in which case realloc() behaves like free(). This could be abused for a later double-free attack as it's even possible to overwrite the free information -- but this depends on the malloc implementation. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> | ||||
2017-02-26 | Also update window title for thumbnail windows (closes #280) | Daniel Friesel | -3/+22 | |
2017-02-23 | Fix memory leak when closing images opened from thumbnail mode | Daniel Friesel | -0/+3 | |
2017-02-16 | I made a derp2.18.2 | Daniel Friesel | -1/+1 | |
2017-01-12 | Pass windidget to feh_action_run, making it possible to use format specifiers | ANogin | -10/+10 | |
like %o and %z in slideshow actions (I would like to use this to zoom in, pan, and then use an action to crop the window to zoomed in view). | ||||
2017-01-11 | rewrite window title whenever the image is rendered (closes #266) | Daniel Friesel | -0/+8 | |
2016-10-30 | imlib.c: Move orientation logic inside HAVE_LIBEXIF | Daniel Friesel | -2/+2 | |
2016-10-29 | add cmdline opt --auto-rotate to rotate according to EXIF info | Elliot Wolk | -1/+7 | |
2016-10-29 | imlib: fix autorotate EXIF parsing | Elliot Wolk | -12/+15 | |
2016-10-24 | thumbnail mode: Add a debug printf for thumbnail image size | Daniel Friesel | -0/+1 | |
2016-10-17 | Properly initialize zoom_fill key binding, set it to ! (exclamation mark) | Daniel Friesel | -0/+1 | |
2016-10-15 | Added a "zoom fit" key binding for the current image. | Ernie Ewert | -3/+14 | |
Fixed(?) Makefile document build issue for README.md | ||||
2016-09-01 | Fix FSF address | Fabio Alessandro Locati | -2/+2 | |
2016-08-31 | winwidget: hostname always has a trailing null byte in the !HOST_NAME_MAX branch | Daniel Friesel | -1/+0 | |
2016-08-31 | Only use sysconf() if HOST_NAME_MAX is undefined | Niclas Zeising | -2/+15 | |
On some systsems sysconf() can return a very large value, unsuitable for use with malloc(). Only use sysconf() if HOST_NAME_MAX isn't avalable. | ||||
2016-08-31 | Fix build on FreeBSD. | Niclas Zeising | -6/+12 | |
FreeBSD lacks the constant HOST_NAME_MAX, instead using sysconf(3) to find out the value of the maximum host name length at run time. Patch to use this instead of HOST_NAME_MAX. This brings with it the need to use malloc instead of using a statically sized buffer for the host name, since the size of the buffer cannot be known at run time. Errors from sysconf or malloc just means that the entire block of code is skipped over (the same way it's skipped if the call to gethostname() fails), rather than returning any kind of error to the caller or logging an error message somewhere. | ||||
2016-08-28 | dedup key/button initialization | Daniel Friesel | -254/+142 | |
2016-08-28 | merge next(_img), prev(_img) and (toggle_)menu | Daniel Friesel | -25/+16 | |
2016-08-28 | Only set _NET_WM_PID once, also set WM_CLIENT_MACHINE | Daniel Friesel | -6/+14 | |
2016-08-27 | Add support for _NET_WM_PID | Klee Dienes | -0/+6 | |
2016-08-27 | Key actions can now also be bound to buttons. not vice versa, though | Daniel Friesel | -73/+217 | |
2016-08-27 | preparations for unified key/button bindings | Daniel Friesel | -71/+64 | |
2016-08-21 | reload timer: always call prepare_filelist for sorting etc (closes #200) | Daniel Friesel | -2/+2 | |
2016-07-24 | support rotation for images loaded via libcurl and imagemagick | Daniel Friesel | -29/+29 | |
2016-07-22 | I may have fixed rotate etc. on remote images (not magick ones, though) | Daniel Friesel | -3/+20 | |
2016-06-24 | Also handle fork() failure in magick_load_image | Daniel Friesel | -1/+7 | |
2016-06-23 | imlib/rotate: Fail gracefully when fork() fails | Daniel Friesel | -3/+3 | |
2016-06-20 | imlib.c: Do not call atexit hooks when terminating a child process (closes #245) | Daniel Friesel | -5/+5 | |
2016-06-06 | next/priv directory: Use PATH_MAX instead of FEH_MAX_DIRNAME_LEN | Daniel Friesel | -10/+9 | |
2016-06-06 | Define PATH_MAX ourselves if it isn't defined by the OS (closes #90) | Daniel Friesel | -1/+12 | |
This is kinda sloppy coding (feh --filelist and --bg-* will fail when running on a system with path lengths >= 4096 and PATH_MAX not defined), but that's sufficiently improbable to be okay. (plus, I ain't getting paid for this, so if you want to improve it feel free to do so) |