Package "xorg-server-source"
Name: |
xorg-server-source
|
Description: |
Xorg X server - source files
|
Latest version: |
2:1.20.13-1ubuntu1~20.04.18 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
xorg-server |
Homepage: |
https://www.x.org/ |
Links
Download "xorg-server-source"
Other versions of "xorg-server-source" in Focal
Changelog
xorg-server (2:1.20.13-1ubuntu1~20.04.18) focal-security; urgency=medium
* SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
- debian/patches/CVE-2024-9632.patch: properly update size in
xkb/xkb.c.
- CVE-2024-9632
-- Marc Deslauriers <email address hidden> Fri, 11 Oct 2024 10:23:55 -0400
|
Source diff to previous version |
CVE-2024-9632 |
A flaw was found in the X.org server. Due to improperly tracked alloca ... |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium
* SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
fix a regression caused for a double-free at the last
changes fixed by CVE-2024-31083 (LP: #2060354)
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 08 Apr 2024 22:36:10 -0300
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
swapping in replies in Xi/xiselectev.c.
- CVE-2024-31080
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31081.patch: fixes byte
swapping in replies in Xi/xipassivegrab.c.
- CVE-2024-31081
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31082.patch: makes
ProcAppleDRICreatePixmap use unswapped length to
send reply in hw/xquartz/xpr/appledir.c.
- CVE-2024-31082
* SECURITY UPDATE: User-after-free
- debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
during ProcRenderAddGlyphs in render/glyph.c.
- CVE-2024-31083
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 17:17:12 -0300
|
Source diff to previous version |
CVE-2024-31080 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31081 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31082 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31083 |
User-after-free in ProcRenderAddGlyphs |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium
* SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
- debian/patches/CVE-2024-21886-3.patch: fix use after free in input
device shutdown in dix/devices.c.
-- Marc Deslauriers <email address hidden> Mon, 29 Jan 2024 07:44:21 -0500
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.14) focal-security; urgency=medium
* SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
ProcXIQueryPointer
- debian/patches/CVE-2023-6816.patch: allocate enough space for logical
button maps in Xi/xiquerypointer.c, dix/enterleave.c.
- CVE-2023-6816
* SECURITY UPDATE: Reattaching to different master device may lead to
out-of-bounds memory access
- debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
our DeviceStateNotify in dix/enterleave.c.
- debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
calculation in dix/enterleave.c.
- debian/patches/CVE-2024-0229-3.patch: when creating a new
ButtonClass, set the number of buttons in Xi/exevents.c.
- debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
device for XIAttachToMaster in Xi/xichangehierarchy.c.
- CVE-2024-0229
* SECURITY UPDATE: SELinux unlabeled GLX PBuffer
- debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
in glx/glxcmds.c.
- CVE-2024-0408
* SECURITY UPDATE: SELinux context corruption
- debian/patches/CVE-2024-0409.patch: use the proper private key for
cursor in hw/kdrive/ephyr/ephyrcursor.c,
hw/xwayland/xwayland-cursor.c.
- CVE-2024-0409
* SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
- debian/patches/CVE-2024-21885.patch: flush hierarchy events after
adding/removing master devices in Xi/xichangehierarchy.c.
- CVE-2024-21885
* SECURITY UPDATE: Heap buffer overflow in DisableDevice
- debian/patches/CVE-2024-21886-1.patch: do not keep linked list
pointer during recursion in dix/devices.c.
- debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
disabled slaved devices too in dix/devices.c.
- CVE-2024-21886
-- Marc Deslauriers <email address hidden> Mon, 15 Jan 2024 10:45:41 -0500
|
|
About
-
Send Feedback to @ubuntu_updates