[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1061110: marked as done (xorg-server: Regression from fixes for CVE-2024-21886)



Your message dated Mon, 22 Jan 2024 12:36:05 +0000
with message-id <E1rRtX3-005m9j-QY@fasolo.debian.org>
and subject line Bug#1061110: fixed in xorg-server 2:21.1.11-2
has caused the Debian Bug report #1061110,
regarding xorg-server: Regression from fixes for CVE-2024-21886
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1061110: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061110
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: xorg-server
Version: 2:21.1.11-1
Severity: important
Tags: upstream
X-Debbugs-Cc: carnil@debian.org, jcristau@debian.org, apo@debian.org, team@security.debian.org

While preparing the update for xorg-server for bookworm an autopkgtest
regression in uqm was seen. The same is shown with the 2:21.1.11-1
upload to unstable:

https://ci.debian.net/packages/u/uqm/testing/amd64/41866714/

Julien Cristau was able to reproduce the leak independly from uqm:

Xvfb :10 & sleep 2; DISPLAY=:10 xdpyinfo >/dev/null

resulting in

1 XSELINUXs still allocated at reset
SCREEN: 0 objects of 304 bytes = 0 total bytes 0 private allocs
DEVICE: 0 objects of 88 bytes = 0 total bytes 0 private allocs
CLIENT: 0 objects of 144 bytes = 0 total bytes 0 private allocs
WINDOW: 0 objects of 48 bytes = 0 total bytes 0 private allocs
PIXMAP: 0 objects of 16 bytes = 0 total bytes 0 private allocs
GC: 0 objects of 16 bytes = 0 total bytes 0 private allocs
CURSOR: 1 objects of 8 bytes = 8 total bytes 0 private allocs
TOTAL: 1 objects, 8 bytes, 0 allocs
1 CURSORs still allocated at reset
CURSOR: 1 objects of 8 bytes = 8 total bytes 0 private allocs
TOTAL: 1 objects, 8 bytes, 0 allocs
1 CURSOR_BITSs still allocated at reset
TOTAL: 0 objects, 0 bytes, 0 allocs

As per upstream commit bisection it seems that the first bad commit is
https://gitlab.freedesktop.org/xorg/xserver/-/commit/26769aa71fcbe0a8403b7fb13b7c9010cc07c3a8
which is related for the CVE-2024-21886 fix.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: xorg-server
Source-Version: 2:21.1.11-2
Done: Julien Cristau <jcristau@debian.org>

We believe that the bug you reported is fixed in the latest version of
xorg-server, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1061110@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <jcristau@debian.org> (supplier of updated xorg-server package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 22 Jan 2024 13:17:07 +0100
Source: xorg-server
Architecture: source
Version: 2:21.1.11-2
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Closes: 1061110
Changes:
 xorg-server (2:21.1.11-2) unstable; urgency=medium
 .
   [ Salvatore Bonaccorso ]
   * dix: Fix use after free in input device shutdown (Closes: #1061110)
Checksums-Sha1:
 2b4d8eb08924a0a64d3cb854eb6805d649238195 4244 xorg-server_21.1.11-2.dsc
 4431b563acdc7b60e97c6eb39040b0a3ab2882ce 169271 xorg-server_21.1.11-2.diff.gz
Checksums-Sha256:
 400d2358ec3c2ce491f80f806a4adea428adc327503b4958c3cf33ae1477e90f 4244 xorg-server_21.1.11-2.dsc
 6c46b83042ebdd1262eeabb6fb96945cb5b92045556ab6dd1fde68d3c57180fc 169271 xorg-server_21.1.11-2.diff.gz
Files:
 55600cec8dfa6d30b38db580439590c8 4244 x11 optional xorg-server_21.1.11-2.dsc
 1a06be6653dcdba98e728a071b4271e6 169271 x11 optional xorg-server_21.1.11-2.diff.gz

-----BEGIN PGP SIGNATURE-----
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=SNxW
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: