ubuntu/+source/xorg-server:applied/debian/stretch

Last commit made on 2018-11-10
Get this branch:
git clone -b applied/debian/stretch https://git.launchpad.net/ubuntu/+source/xorg-server
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/debian/stretch
Repository:
lp:ubuntu/+source/xorg-server

Recent commits

5db54c2... by Andreas Boll <email address hidden> on 2018-10-31

Import patches-applied version 2:1.19.2-1+deb9u5 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 31220f1f03821bb2b78b54517496586de5f426f9
Unapplied parent: 26405a809ea560576dbd13460687c0a6fb8c60f4

New changelog entries:
  * Cherry-pick c2954b16c (glx: do not pick sRGB config for 32-bit RGBA
    visual) from upstream. Fixes various blending issues with kwin and
    Mesa >= 18.0 (i.e. Mesa from stretch-backports) (Closes: #908601).
    Thanks to Nicholas D Steeves and Robert Trebula for testing!
  * Disable -logfile and -modulepath when running with elevated privileges.
    Addresses CVE-2018-14665.

26405a8... by Andreas Boll <email address hidden> on 2018-10-31

Import patches-unapplied version 2:1.19.2-1+deb9u5 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 086ac6c6ca102fe525a493d823f4b6da28b7daaf

New changelog entries:
  * Cherry-pick c2954b16c (glx: do not pick sRGB config for 32-bit RGBA
    visual) from upstream. Fixes various blending issues with kwin and
    Mesa >= 18.0 (i.e. Mesa from stretch-backports) (Closes: #908601).
    Thanks to Nicholas D Steeves and Robert Trebula for testing!
  * Disable -logfile and -modulepath when running with elevated privileges.
    Addresses CVE-2018-14665.

31220f1... by Julien Cristau on 2017-10-14

Import patches-applied version 2:1.19.2-1+deb9u2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 877d7e2ec1c261122f19939fbeb95a18f4b6d105
Unapplied parent: 086ac6c6ca102fe525a493d823f4b6da28b7daaf

New changelog entries:
  * Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
  * dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo
    (CVE-2017-12177)
  * Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
  * Xi: integer overflow and unvalidated length in
    (S)ProcXIBarrierReleasePointer (CVE-2017-12179)
  * Unvalidated lengths in
    - XFree86-VidModeExtension (CVE-2017-12180)
    - XFree86-DGA (CVE-2017-12181)
    - XFree86-DRI (CVE-2017-12182)
    - XFIXES (CVE-2017-12183)
    - XINERAMA (CVE-2017-12184
    - MIT-SCREEN-SAVER (CVE-2017-12185
    - X-Resource (CVE-2017-12186
    - RENDER (CVE-2017-12187)
  * os: Make sure big requests have sufficient length.
  * Xext/shm: Validate shmseg resource id (CVE-2017-13721)
  * xkb: Handle xkb formated string output safely (CVE-2017-13723)
  * xkb: Escape non-printable characters correctly.
  * render: Fix out of boundary heap access

086ac6c... by Julien Cristau on 2017-10-14

Import patches-unapplied version 2:1.19.2-1+deb9u2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 2661921198bf7c460f71c69acee6019461efaaff

New changelog entries:
  * Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
  * dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo
    (CVE-2017-12177)
  * Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
  * Xi: integer overflow and unvalidated length in
    (S)ProcXIBarrierReleasePointer (CVE-2017-12179)
  * Unvalidated lengths in
    - XFree86-VidModeExtension (CVE-2017-12180)
    - XFree86-DGA (CVE-2017-12181)
    - XFree86-DRI (CVE-2017-12182)
    - XFIXES (CVE-2017-12183)
    - XINERAMA (CVE-2017-12184
    - MIT-SCREEN-SAVER (CVE-2017-12185
    - X-Resource (CVE-2017-12186
    - RENDER (CVE-2017-12187)
  * os: Make sure big requests have sufficient length.
  * Xext/shm: Validate shmseg resource id (CVE-2017-13721)
  * xkb: Handle xkb formated string output safely (CVE-2017-13723)
  * xkb: Escape non-printable characters correctly.
  * render: Fix out of boundary heap access

877d7e2... by Salvatore Bonaccorso on 2017-07-07

Import patches-applied version 2:1.19.2-1+deb9u1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 041e0d98d02205e9bdb762d2f9009fe6ace2b127
Unapplied parent: 2661921198bf7c460f71c69acee6019461efaaff

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-10971: stack buffer overflow in X Event structures handling
    (Closes: #867492)
  * CVE-2017-10972: information leak due to an uninitialized stack area when
    swapping endianess.
    (Closes: #867492)

2661921... by Salvatore Bonaccorso on 2017-07-07

Import patches-unapplied version 2:1.19.2-1+deb9u1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 5c1b8f2fa2a0055995beedb8c1ec35ebfceaca84

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-10971: stack buffer overflow in X Event structures handling
    (Closes: #867492)
  * CVE-2017-10972: information leak due to an uninitialized stack area when
    swapping endianess.
    (Closes: #867492)

041e0d9... by Emilio Pozuelo Monfort <email address hidden> on 2017-03-03

Import patches-applied version 2:1.19.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 090a44f1c78c117e1d44d24b85a9222e695d0c58
Unapplied parent: 5c1b8f2fa2a0055995beedb8c1ec35ebfceaca84

New changelog entries:
  [ Andreas Boll ]
  * xserver-xorg-core.bug.script: Change udevadm path from /sbin to /bin
    (Closes: #852584).
  [ Emilio Pozuelo Monfort ]
  * New upstream stable release.
    - CVE-2017-2624: Timing attack against MIT cookie. Closes: #856398.
  * control: Build-depend on libbsd-dev everywhere, needed for
    arc4random_buf for the above fix.

5c1b8f2... by Emilio Pozuelo Monfort <email address hidden> on 2017-03-03

Import patches-unapplied version 2:1.19.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 40a3648a5c664153f90a8f9d62c75e5506c75c59

New changelog entries:
  [ Andreas Boll ]
  * xserver-xorg-core.bug.script: Change udevadm path from /sbin to /bin
    (Closes: #852584).
  [ Emilio Pozuelo Monfort ]
  * New upstream stable release.
    - CVE-2017-2624: Timing attack against MIT cookie. Closes: #856398.
  * control: Build-depend on libbsd-dev everywhere, needed for
    arc4random_buf for the above fix.

090a44f... by Emilio Pozuelo Monfort <email address hidden> on 2017-01-19

Import patches-applied version 2:1.19.1-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 8a7e2a69acbb01df5743b3d62e6f18ae35b4f757
Unapplied parent: 40a3648a5c664153f90a8f9d62c75e5506c75c59

New changelog entries:
  * rules: Only set the suid bit on Xorg.wrap when building arch:any
    packages. Thanks Julien Cristau.

40a3648... by Emilio Pozuelo Monfort <email address hidden> on 2017-01-19

Import patches-unapplied version 2:1.19.1-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: bdf3d5283601969f805b3f8b61711118acebc5db

New changelog entries:
  * rules: Only set the suid bit on Xorg.wrap when building arch:any
    packages. Thanks Julien Cristau.