-
xwayland (2:23.2.0-1ubuntu0.6) mantic-security; urgency=medium
* SECURITY REGRESSION: Fix for CVE-2024-31083 introduced a potential
double-free error, causing X to crash
- debian/patches/CVE-2024-31083-regression_fix-MR_1476.patch:
render: Avoid possible double-free in ProcRenderAddGlyphs()
- LP: #2060354
-- Steve Beattie <email address hidden> Mon, 08 Apr 2024 20:37:39 -0700
-
xwayland (2:23.2.0-1ubuntu0.5) mantic-security; urgency=medium
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
swapping in replies in Xi/xiselectev.c.
- CVE-2024-31080
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31081.patch: fixes byte
swapping in replies in Xi/xipassivegrab.c.
- CVE-2024-31081
* SECURITY UPDATE: User-after-free
- debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
during ProcRenderAddGlyphs in render/glyph.c.
- CVE-2024-31083
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 16:53:20 -0300
-
xwayland (2:23.2.0-1ubuntu0.4) mantic-security; urgency=medium
* SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
ProcXIQueryPointer
- debian/patches/CVE-2023-6816.patch: allocate enough space for logical
button maps in Xi/xiquerypointer.c, dix/enterleave.c.
- CVE-2023-6816
* SECURITY UPDATE: Reattaching to different master device may lead to
out-of-bounds memory access
- debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
our DeviceStateNotify in dix/enterleave.c.
- debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
calculation in dix/enterleave.c.
- debian/patches/CVE-2024-0229-3.patch: when creating a new
ButtonClass, set the number of buttons in Xi/exevents.c.
- debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
device for XIAttachToMaster in Xi/xichangehierarchy.c.
- CVE-2024-0229
* SECURITY UPDATE: SELinux unlabeled GLX PBuffer
- debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
in glx/glxcmds.c.
- CVE-2024-0408
* SECURITY UPDATE: SELinux context corruption
- debian/patches/CVE-2024-0409.patch: use the proper private key for
cursor in hw/xwayland/xwayland-cursor.c.
- CVE-2024-0409
* SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
- debian/patches/CVE-2024-21885.patch: flush hierarchy events after
adding/removing master devices in Xi/xichangehierarchy.c.
- CVE-2024-21885
* SECURITY UPDATE: Heap buffer overflow in DisableDevice
- debian/patches/CVE-2024-21886-1.patch: do not keep linked list
pointer during recursion in dix/devices.c.
- debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
disabled slaved devices too in dix/devices.c.
- CVE-2024-21886
-- Marc Deslauriers <email address hidden> Mon, 15 Jan 2024 13:03:30 -0500
-
xwayland (2:23.2.0-1ubuntu0.3) mantic-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds memory write in XKB button actions
- debian/patches/CVE-2023-6377.patch: allocate enough XkbActions for
our buttons in Xi/exevents.c, dix/devices.c.
- CVE-2023-6377
* SECURITY UPDATE: Out-of-bounds memory read in RRChangeOutputProperty
and RRChangeProviderProperty
- debian/patches/CVE-2023-6478.patch: avoid integer truncation in
length check of ProcRRChange*Property in randr/rrproperty.c,
randr/rrproviderproperty.c.
- CVE-2023-6478
-- Marc Deslauriers <email address hidden> Tue, 12 Dec 2023 20:30:20 -0500
-
xwayland (2:23.2.0-1ubuntu0.1) mantic-security; urgency=medium
* SECURITY UPDATE: OOB write in XIChangeDeviceProperty and
RRChangeOutputProperty
- debian/patches/CVE-2023-5367.patch: fix handling of PropModeAppend
and PropModePrepend in Xi/xiproperty.c, randr/rrproperty.c.
- CVE-2023-5367
-- Marc Deslauriers <email address hidden> Mon, 16 Oct 2023 09:12:41 -0400
-
xwayland (2:23.2.0-1) unstable; urgency=medium
* New upstream release.
* patches: Refreshed.
* control: Bump x11proto-dev depends.
-- Timo Aaltonen <email address hidden> Wed, 16 Aug 2023 15:27:59 +0300
-
xwayland (2:23.1.1-1) experimental; urgency=medium
* New upstream release.
* control: Fix cross-building, add libwayland-dev:native to build-
depends. (Closes: #1002515)
-- Timo Aaltonen <email address hidden> Thu, 11 May 2023 13:10:04 +0300
-
xwayland (2:22.1.9-1) unstable; urgency=high
* New upstream bugfix release
- composite: Fix use-after-free of the COW (CVE-2023-1393)
-- Julien Cristau <email address hidden> Wed, 29 Mar 2023 15:23:04 +0200
-
xwayland (2:22.1.8-1ubuntu1) lunar; urgency=medium
* SECURITY UPDATE: Overlay Window Use-After-Free
- debian/patches/CVE-2023-1393.patch: fix use-after-free of the COW in
composite/compwindow.c.
- CVE-2023-1393
-- Marc Deslauriers <email address hidden> Fri, 31 Mar 2023 12:56:54 -0400