UbuntuUpdates.org

Package "xorg-server-source"

Name: xorg-server-source

Description:

Xorg X server - source files

Latest version: 2:21.1.4-2ubuntu1.7~22.04.12
Release: jammy (22.04)
Level: updates
Repository: universe
Head package: xorg-server
Homepage: https://www.x.org/

Links


Download "xorg-server-source"


Other versions of "xorg-server-source" in Jammy

Repository Area Version
base universe 2:21.1.3-2ubuntu2
security universe 2:21.1.4-2ubuntu1.7~22.04.12

Changelog

Version: 2:21.1.4-2ubuntu1.7~22.04.7 2024-01-16 18:08:26 UTC

  xorg-server (2:21.1.4-2ubuntu1.7~22.04.7) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
    ProcXIQueryPointer
    - debian/patches/CVE-2023-6816.patch: allocate enough space for logical
      button maps in Xi/xiquerypointer.c, dix/enterleave.c.
    - CVE-2023-6816
  * SECURITY UPDATE: Reattaching to different master device may lead to
    out-of-bounds memory access
    - debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
      our DeviceStateNotify in dix/enterleave.c.
    - debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
      calculation in dix/enterleave.c.
    - debian/patches/CVE-2024-0229-3.patch: when creating a new
      ButtonClass, set the number of buttons in Xi/exevents.c.
    - debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
      device for XIAttachToMaster in Xi/xichangehierarchy.c.
    - CVE-2024-0229
  * SECURITY UPDATE: SELinux unlabeled GLX PBuffer
    - debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
      in glx/glxcmds.c.
    - CVE-2024-0408
  * SECURITY UPDATE: SELinux context corruption
    - debian/patches/CVE-2024-0409.patch: use the proper private key for
      cursor in hw/kdrive/ephyr/ephyrcursor.c.
    - CVE-2024-0409
  * SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
    - debian/patches/CVE-2024-21885.patch: flush hierarchy events after
      adding/removing master devices in Xi/xichangehierarchy.c.
    - CVE-2024-21885
  * SECURITY UPDATE: Heap buffer overflow in DisableDevice
    - debian/patches/CVE-2024-21886-1.patch: do not keep linked list
      pointer during recursion in dix/devices.c.
    - debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
      disabled slaved devices too in dix/devices.c.
    - CVE-2024-21886

 -- Marc Deslauriers <email address hidden> Mon, 15 Jan 2024 10:45:41 -0500

Source diff to previous version
CVE-2023-6816 Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer
CVE-2024-0229 Reattaching to different master device may lead to out-of-bounds memory access
CVE-2024-0408 SELinux unlabeled GLX PBuffer
CVE-2024-0409 SELinux context corruption
CVE-2024-21885 Heap buffer overflow in XISendDeviceHierarchyEvent
CVE-2024-21886 Heap buffer overflow in DisableDevice

Version: 2:21.1.4-2ubuntu1.7~22.04.5 2023-12-13 17:09:51 UTC

  xorg-server (2:21.1.4-2ubuntu1.7~22.04.5) jammy-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds memory write in XKB button actions
    - debian/patches/CVE-2023-6377.patch: allocate enough XkbActions for
      our buttons in Xi/exevents.c, dix/devices.c.
    - CVE-2023-6377
  * SECURITY UPDATE: Out-of-bounds memory read in RRChangeOutputProperty
    and RRChangeProviderProperty
    - debian/patches/CVE-2023-6478.patch: avoid integer truncation in
      length check of ProcRRChange*Property in randr/rrproperty.c,
      randr/rrproviderproperty.c.
    - CVE-2023-6478

 -- Marc Deslauriers <email address hidden> Tue, 12 Dec 2023 20:28:33 -0500

Source diff to previous version
CVE-2023-6377 A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory
CVE-2023-6478 A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow wh

Version: 2:21.1.4-2ubuntu1.7~22.04.2 2023-10-25 20:13:02 UTC

  xorg-server (2:21.1.4-2ubuntu1.7~22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: OOB write in XIChangeDeviceProperty and
    RRChangeOutputProperty
    - debian/patches/CVE-2023-5367.patch: fix handling of PropModeAppend
      and PropModePrepend in Xi/xiproperty.c, randr/rrproperty.c.
    - CVE-2023-5367
  * SECURITY UPDATE: Use-after-free bug in DestroyWindow
    - debian/patches/CVE-2023-5380.patch: reset the PointerWindows
      reference on screen switch in dix/enterleave.h, include/eventstr.h,
      mi/mipointer.c.
    - CVE-2023-5380

 -- Marc Deslauriers <email address hidden> Mon, 23 Oct 2023 12:30:42 -0400

Source diff to previous version
CVE-2023-5367 X.Org server: OOB write in XIChangeDeviceProperty/RRChangeOutputProperty
CVE-2023-5380 Use-after-free bug in DestroyWindow

Version: 2:21.1.4-2ubuntu1.7~22.04.1 2023-04-13 11:07:03 UTC

  xorg-server (2:21.1.4-2ubuntu1.7~22.04.1) jammy; urgency=medium

  * Backport to jammy. (LP: #2009767)

 -- Timo Aaltonen <email address hidden> Tue, 04 Apr 2023 09:20:09 +0300

Source diff to previous version

Version: 2:21.1.3-2ubuntu2.9 2023-03-29 21:07:01 UTC

  xorg-server (2:21.1.3-2ubuntu2.9) jammy-security; urgency=medium

  * SECURITY UPDATE: Overlay Window Use-After-Free
    - debian/patches/CVE-2023-1393.patch: fix use-after-free of the COW in
      composite/compwindow.c.
    - CVE-2023-1393

 -- Marc Deslauriers <email address hidden> Wed, 29 Mar 2023 08:52:16 -0400




About   -   Send Feedback to @ubuntu_updates