Package "xdmx-tools"
Name: |
xdmx-tools
|
Description: |
Distributed Multihead X tools
|
Latest version: |
2:1.20.13-1ubuntu1~20.04.17 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
xorg-server |
Homepage: |
https://www.x.org/ |
Links
Download "xdmx-tools"
Other versions of "xdmx-tools" in Focal
Changelog
xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium
* SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
fix a regression caused for a double-free at the last
changes fixed by CVE-2024-31083 (LP: #2060354)
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 08 Apr 2024 22:36:10 -0300
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
swapping in replies in Xi/xiselectev.c.
- CVE-2024-31080
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31081.patch: fixes byte
swapping in replies in Xi/xipassivegrab.c.
- CVE-2024-31081
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31082.patch: makes
ProcAppleDRICreatePixmap use unswapped length to
send reply in hw/xquartz/xpr/appledir.c.
- CVE-2024-31082
* SECURITY UPDATE: User-after-free
- debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
during ProcRenderAddGlyphs in render/glyph.c.
- CVE-2024-31083
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 17:17:12 -0300
|
Source diff to previous version |
CVE-2024-31080 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31081 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31082 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31083 |
User-after-free in ProcRenderAddGlyphs |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium
* SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
- debian/patches/CVE-2024-21886-3.patch: fix use after free in input
device shutdown in dix/devices.c.
-- Marc Deslauriers <email address hidden> Mon, 29 Jan 2024 07:44:21 -0500
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.14) focal-security; urgency=medium
* SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
ProcXIQueryPointer
- debian/patches/CVE-2023-6816.patch: allocate enough space for logical
button maps in Xi/xiquerypointer.c, dix/enterleave.c.
- CVE-2023-6816
* SECURITY UPDATE: Reattaching to different master device may lead to
out-of-bounds memory access
- debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
our DeviceStateNotify in dix/enterleave.c.
- debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
calculation in dix/enterleave.c.
- debian/patches/CVE-2024-0229-3.patch: when creating a new
ButtonClass, set the number of buttons in Xi/exevents.c.
- debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
device for XIAttachToMaster in Xi/xichangehierarchy.c.
- CVE-2024-0229
* SECURITY UPDATE: SELinux unlabeled GLX PBuffer
- debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
in glx/glxcmds.c.
- CVE-2024-0408
* SECURITY UPDATE: SELinux context corruption
- debian/patches/CVE-2024-0409.patch: use the proper private key for
cursor in hw/kdrive/ephyr/ephyrcursor.c,
hw/xwayland/xwayland-cursor.c.
- CVE-2024-0409
* SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
- debian/patches/CVE-2024-21885.patch: flush hierarchy events after
adding/removing master devices in Xi/xichangehierarchy.c.
- CVE-2024-21885
* SECURITY UPDATE: Heap buffer overflow in DisableDevice
- debian/patches/CVE-2024-21886-1.patch: do not keep linked list
pointer during recursion in dix/devices.c.
- debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
disabled slaved devices too in dix/devices.c.
- CVE-2024-21886
-- Marc Deslauriers <email address hidden> Mon, 15 Jan 2024 10:45:41 -0500
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.12) focal-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds memory write in XKB button actions
- debian/patches/CVE-2023-6377.patch: allocate enough XkbActions for
our buttons in Xi/exevents.c, dix/devices.c.
- CVE-2023-6377
* SECURITY UPDATE: Out-of-bounds memory read in RRChangeOutputProperty
and RRChangeProviderProperty
- debian/patches/CVE-2023-6478.patch: avoid integer truncation in
length check of ProcRRChange*Property in randr/rrproperty.c,
randr/rrproviderproperty.c.
- CVE-2023-6478
-- Marc Deslauriers <email address hidden> Tue, 12 Dec 2023 20:29:21 -0500
|
CVE-2023-6377 |
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory |
CVE-2023-6478 |
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow wh |
|
About
-
Send Feedback to @ubuntu_updates