[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

xorg-server: Changes to 'refs/tags/xorg-server-2_1.16.4-1+deb8u2'



Tag 'xorg-server-2_1.16.4-1+deb8u2' created by Julien Cristau <jcristau@debian.org> at 2017-10-14 11:35 +0000

Tagging upload of xorg-server 2:1.16.4-1+deb8u2 to jessie-security.
-----BEGIN PGP SIGNATURE-----
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=2395
-----END PGP SIGNATURE-----

Changes since xorg-server-2_1.16.4-1:
Jeremy Huddleston Sequoia (1):
      Xi: Silence some tautological warnings

Julien Cristau (4):
      Import 2:1.16.4-1+deb8u1 security update
      Changelog update
      Update changelog
      Upload to jessie-security

Keith Packard (1):
      xkb: Handle xkb formated string output safely (CVE-2017-13723)

Matthieu Herrb (1):
      Use timingsafe_memcmp() to compare MIT-MAGIC-COOKIES CVE-2017-2624

Michal Srb (4):
      Xi: Test exact size of XIBarrierReleasePointer
      Xext/shm: Validate shmseg resource id (CVE-2017-13721)
      os: Make sure big requests have sufficient length.
      xkb: Escape non-printable characters correctly.

Nathan Kidd (7):
      Unvalidated lengths
      xfixes: unvalidated lengths (CVE-2017-12183)
      hw/xfree86: unvalidated lengths
      Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
      Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
      dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
      Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)

Ray Strode (3):
      xwayland: Enable access control on open sockets [CVE-2015-3164 1/3]
      os: support new implicit local user access mode [CVE-2015-3164 2/3]
      xwayland: default to local user if no xauth file given. [CVE-2015-3164 3/3]

Tobias Stoeckmann (1):
      render: Fix out of boundary heap access

---
 Xext/panoramiX.c              |    3 
 Xext/saver.c                  |    2 
 Xext/shm.c                    |    1 
 Xext/xres.c                   |    4 -
 Xext/xvdisp.c                 |    4 -
 Xi/sendexev.c                 |   24 +++++--
 Xi/xibarriers.c               |   12 +++
 Xi/xichangehierarchy.c        |    6 -
 configure.ac                  |    2 
 dbe/dbe.c                     |    5 +
 debian/changelog              |   34 +++++++++++
 dix/dispatch.c                |    7 +-
 dix/events.c                  |    6 +
 dix/swapreq.c                 |    7 ++
 hw/dmx/dmxpict.c              |    2 
 hw/xfree86/common/xf86DGA.c   |   81 ++++++++++++++------------
 hw/xfree86/common/xf86vmode.c |  129 ++++++++++++++++++++++--------------------
 hw/xfree86/dri/xf86dri.c      |    1 
 hw/xwayland/xwayland.c        |    4 -
 include/dix-config.h.in       |    3 
 include/os.h                  |   22 +++++++
 os/access.c                   |  109 +++++++++++++++++++++++++++++++++++
 os/auth.c                     |    8 +-
 os/io.c                       |    5 +
 os/mitauth.c                  |    2 
 os/timingsafe_memcmp.c        |   45 ++++++++++++++
 pseudoramiX/pseudoramiX.c     |    3 
 render/render.c               |    7 ++
 xfixes/cursor.c               |    5 +
 xfixes/region.c               |    3 
 xfixes/saveset.c              |    1 
 xfixes/xfixes.c               |    1 
 xkb/xkbtext.c                 |   42 ++++++-------
 33 files changed, 447 insertions(+), 143 deletions(-)
---


Reply to: