xorg-server: Changes to 'refs/tags/xorg-server-2_1.16.4-1+deb8u2'
Tag 'xorg-server-2_1.16.4-1+deb8u2' created by Julien Cristau <jcristau@debian.org> at 2017-10-14 11:35 +0000
Tagging upload of xorg-server 2:1.16.4-1+deb8u2 to jessie-security.
-----BEGIN PGP SIGNATURE-----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=2395
-----END PGP SIGNATURE-----
Changes since xorg-server-2_1.16.4-1:
Jeremy Huddleston Sequoia (1):
Xi: Silence some tautological warnings
Julien Cristau (4):
Import 2:1.16.4-1+deb8u1 security update
Changelog update
Update changelog
Upload to jessie-security
Keith Packard (1):
xkb: Handle xkb formated string output safely (CVE-2017-13723)
Matthieu Herrb (1):
Use timingsafe_memcmp() to compare MIT-MAGIC-COOKIES CVE-2017-2624
Michal Srb (4):
Xi: Test exact size of XIBarrierReleasePointer
Xext/shm: Validate shmseg resource id (CVE-2017-13721)
os: Make sure big requests have sufficient length.
xkb: Escape non-printable characters correctly.
Nathan Kidd (7):
Unvalidated lengths
xfixes: unvalidated lengths (CVE-2017-12183)
hw/xfree86: unvalidated lengths
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Ray Strode (3):
xwayland: Enable access control on open sockets [CVE-2015-3164 1/3]
os: support new implicit local user access mode [CVE-2015-3164 2/3]
xwayland: default to local user if no xauth file given. [CVE-2015-3164 3/3]
Tobias Stoeckmann (1):
render: Fix out of boundary heap access
---
Xext/panoramiX.c | 3
Xext/saver.c | 2
Xext/shm.c | 1
Xext/xres.c | 4 -
Xext/xvdisp.c | 4 -
Xi/sendexev.c | 24 +++++--
Xi/xibarriers.c | 12 +++
Xi/xichangehierarchy.c | 6 -
configure.ac | 2
dbe/dbe.c | 5 +
debian/changelog | 34 +++++++++++
dix/dispatch.c | 7 +-
dix/events.c | 6 +
dix/swapreq.c | 7 ++
hw/dmx/dmxpict.c | 2
hw/xfree86/common/xf86DGA.c | 81 ++++++++++++++------------
hw/xfree86/common/xf86vmode.c | 129 ++++++++++++++++++++++--------------------
hw/xfree86/dri/xf86dri.c | 1
hw/xwayland/xwayland.c | 4 -
include/dix-config.h.in | 3
include/os.h | 22 +++++++
os/access.c | 109 +++++++++++++++++++++++++++++++++++
os/auth.c | 8 +-
os/io.c | 5 +
os/mitauth.c | 2
os/timingsafe_memcmp.c | 45 ++++++++++++++
pseudoramiX/pseudoramiX.c | 3
render/render.c | 7 ++
xfixes/cursor.c | 5 +
xfixes/region.c | 3
xfixes/saveset.c | 1
xfixes/xfixes.c | 1
xkb/xkbtext.c | 42 ++++++-------
33 files changed, 447 insertions(+), 143 deletions(-)
---
Reply to: