UbuntuUpdates.org

Package "xdmx"

Name: xdmx

Description:

distributed multihead X server

Latest version: 2:1.18.4-0ubuntu0.12
Release: xenial (16.04)
Level: security
Repository: universe
Head package: xorg-server
Homepage: http://www.x.org/

Links


Download "xdmx"


Other versions of "xdmx" in Xenial

Repository Area Version
base universe 2:1.18.3-1ubuntu2
updates universe 2:1.18.4-0ubuntu0.12

Changelog

Version: 2:1.18.4-0ubuntu0.6 2017-10-12 15:06:52 UTC

  xorg-server (2:1.18.4-0ubuntu0.6) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
    - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
      Xext/shm.c.
    - CVE-2017-13721
  * SECURITY UPDATE: buffer overflow via XKB data
    - debian/patches/CVE-2017-13723.patch: handle xkb formatted string
      output safely in xkb/xkbtext.c.
    - CVE-2017-13723
  * This update does _not_ contain the changes from 2:1.18.4-0ubuntu0.5 in
    xenial-proposed.

 -- Marc Deslauriers <email address hidden> Wed, 11 Oct 2017 13:27:20 -0400

Source diff to previous version
CVE-2017-1372 IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScri

Version: 2:1.18.4-0ubuntu0.3 2017-07-24 18:06:48 UTC

  xorg-server (2:1.18.4-0ubuntu0.3) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution in endianness
    conversion of X Events
    - debian/patches/CVE-2017-10971-1.patch: do not try to swap
      GenericEvent in Xi/sendexev.c.
    - debian/patches/CVE-2017-10971-2.patch: verify all events in
      ProcXSendExtensionEvent in Xi/sendexev.c.
    - debian/patches/CVE-2017-10971-3.patch: disallow GenericEvent in
      SendEvent request in dix/events.c, dix/swapreq.c.
    - CVE-2017-10971
  * SECURITY UPDATE: information leak in XEvent handling
    - debian/patches/CVE-2017-10972.patch: zero target buffer in
      SProcXSendExtensionEvent in Xi/sendexev.c.
    - CVE-2017-10972
  * SECURITY UPDATE: MIT-MAGIC-COOKIES timing attack
    - debian/patches/CVE-2017-2624.patch: use timingsafe_memcmp() in
      configure.ac, include/dix-config.h.in, include/os.h,
      os/mitauth.c, os/timingsafe_memcmp.c.
    - CVE-2017-2624

 -- Marc Deslauriers <email address hidden> Mon, 17 Jul 2017 09:38:58 -0400

CVE-2017-1097 RESERVED
CVE-2017-2624 Timing attack against MIT Cookie



About   -   Send Feedback to @ubuntu_updates