Format: 1.8 Date: Mon, 15 Jan 2024 10:45:41 -0500 Source: xorg-server Binary: xnest xserver-xephyr xserver-xorg-core xserver-xorg-dev xserver-xorg-legacy xvfb Built-For-Profiles: noudeb Architecture: riscv64 riscv64_translations Version: 2:21.1.4-2ubuntu1.7~22.04.7 Distribution: jammy Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: xnest - Nested X server xserver-xephyr - nested X server xserver-xorg-core - Xorg X server - core server xserver-xorg-dev - Xorg X server - development files xserver-xorg-legacy - setuid root Xorg server wrapper xvfb - Virtual Framebuffer 'fake' X server Changes: xorg-server (2:21.1.4-2ubuntu1.7~22.04.7) jammy-security; urgency=medium . * SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer - debian/patches/CVE-2023-6816.patch: allocate enough space for logical button maps in Xi/xiquerypointer.c, dix/enterleave.c. - CVE-2023-6816 * SECURITY UPDATE: Reattaching to different master device may lead to out-of-bounds memory access - debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for our DeviceStateNotify in dix/enterleave.c. - debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event calculation in dix/enterleave.c. - debian/patches/CVE-2024-0229-3.patch: when creating a new ButtonClass, set the number of buttons in Xi/exevents.c. - debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard device for XIAttachToMaster in Xi/xichangehierarchy.c. - CVE-2024-0229 * SECURITY UPDATE: SELinux unlabeled GLX PBuffer - debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer in glx/glxcmds.c. - CVE-2024-0408 * SECURITY UPDATE: SELinux context corruption - debian/patches/CVE-2024-0409.patch: use the proper private key for cursor in hw/kdrive/ephyr/ephyrcursor.c. - CVE-2024-0409 * SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent - debian/patches/CVE-2024-21885.patch: flush hierarchy events after adding/removing master devices in Xi/xichangehierarchy.c. - CVE-2024-21885 * SECURITY UPDATE: Heap buffer overflow in DisableDevice - debian/patches/CVE-2024-21886-1.patch: do not keep linked list pointer during recursion in dix/devices.c. - debian/patches/CVE-2024-21886-2.patch: when disabling a master, float disabled slaved devices too in dix/devices.c. - CVE-2024-21886 Checksums-Sha1: eb204efb871abfc7f02e2de1520b2d7bc89a1341 2706456 xnest-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb ffc16902bed1cf7640f7035b27c9cbef01482235 658724 xnest_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 27e2576eea95a7559a84da5b1d41d8ed7560e6e9 15329 xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64.buildinfo b902096d8eb1000f502456534606730dc3e4ec7b 28319 xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64_translations.tar.gz 5fbc41a0ea92a8ee1935e185d045114a8f058ef8 3950290 xserver-xephyr-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb c109a9d76e1c1eacb29007d305903008a7df8815 922074 xserver-xephyr_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 8bb7671e8d4f739a177331522a592b85f9d2d2b1 5745498 xserver-xorg-core-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 1a348f98a1f11122d2157a88c261ff07e9698644 1324630 xserver-xorg-core_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb c691ed64065ba1ef8f81f7c6b5183fcae5e6041d 203618 xserver-xorg-dev_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb ed9d005169c02fea4d19dcca668da99d0c0fef3a 9642 xserver-xorg-legacy-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 6a9edb728c4c83354f49183a94ab64c2d807ce60 35060 xserver-xorg-legacy_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 77b3700dc88345a405cffbfca12053a4392d9dc9 3290786 xvfb-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb cd55d9bc3540d4bbf0dc89051bc83f3eb94d57a1 796152 xvfb_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb Checksums-Sha256: cacce34da330cd45d5d6abe7fdc03ed8761155259fdd647c7e462882ca3599ea 2706456 xnest-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 5412f84562d581e4f259ffad338b65af2351058993e2de6cdefbdb395aefa612 658724 xnest_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb a287904e3edd76a2052608e06094fcec114601a6f68dced25f79542da837a0e2 15329 xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64.buildinfo 2f272cb7c2fbf4644ce59ef02f27189fe6faad294f0e50d43debeb7b38bc25d9 28319 xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64_translations.tar.gz 0779c30c82375d6a43f6e6f39493e0a0614938d3a54cca56a8d95f49fabec003 3950290 xserver-xephyr-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb d11714cf239d7a2c0f4e4cff9837c487c1695b50e1b1377cf697cdf3806758a9 922074 xserver-xephyr_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb dad7208a6bcf00fe8c4124c04344f7a938098a7b9890efebc528acd90cc1ada3 5745498 xserver-xorg-core-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb bc6796026c7c71e29ef178aac67692a6d32f74e71d732b1e5dc2c4c10ba7790c 1324630 xserver-xorg-core_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb b589f95ffadd2831c9d9a0b962b233071576c85a2d2314168a095f5f49ee9dbb 203618 xserver-xorg-dev_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb e8561919580bb7937e625f4be1cf6fd10691e5633e2a9800539d7350130a1acb 9642 xserver-xorg-legacy-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb b1853755cca5926d3de569a5dc32c66c6a53f7d8036696c7122d668331f16903 35060 xserver-xorg-legacy_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 41ba77c1a6ed6cab658d6af922781f204bec5050ab7e07d636ecb8f775625822 3290786 xvfb-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 1132bed5d343d5e809ea02800a76ac64b61ea91e508909f6e7536da1a066ef04 796152 xvfb_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb Files: 4b976ce1f8d9d4e8d621bde42cce021f 2706456 debug optional xnest-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 542e341a3b9d2c68e8b95d089a4e71ca 658724 x11 optional xnest_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb d10fc0c2f496b94874dd1f22c34a256d 15329 x11 optional xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64.buildinfo 6c27b706f1a0fa398b467770c1fa206e 28319 raw-translations - xorg-server_21.1.4-2ubuntu1.7~22.04.7_riscv64_translations.tar.gz 0d7c37f80baa9ae892b4001036234bf4 3950290 debug optional xserver-xephyr-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb c9d4a28e798357087daf4195e60bfe8e 922074 x11 optional xserver-xephyr_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 7c430fc3fb97aeeafddc0457c2ad7987 5745498 debug optional xserver-xorg-core-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb 18b637c585b6f6fbe41ee53aa22286b6 1324630 x11 optional xserver-xorg-core_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 3e82829edfee454ae91a7181778a3f37 203618 x11 optional xserver-xorg-dev_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 35d7c420c0cdbac964065d08e68b7c4e 9642 debug optional xserver-xorg-legacy-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb a588b007aae223f8d822dc76585c687d 35060 x11 optional xserver-xorg-legacy_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb 9fe75c87e6396f8ccd7b007e38a236a1 3290786 debug optional xvfb-dbgsym_21.1.4-2ubuntu1.7~22.04.7_riscv64.ddeb db792ee19bde0c4b27cdc13589baf56d 796152 x11 optional xvfb_21.1.4-2ubuntu1.7~22.04.7_riscv64.deb Original-Maintainer: Debian X Strike Force