UbuntuUpdates.org

Package "xorg-server-source-hwe-16.04"

Name: xorg-server-source-hwe-16.04

Description:

Xorg X server - source files

Latest version: 2:1.19.6-1ubuntu4.1~16.04.6
Release: xenial (16.04)
Level: updates
Repository: universe
Head package: xorg-server-hwe-16.04
Homepage: https://www.x.org/

Links


Download "xorg-server-source-hwe-16.04"


Other versions of "xorg-server-source-hwe-16.04" in Xenial

Repository Area Version
security universe 2:1.19.6-1ubuntu4.1~16.04.6

Changelog

Version: 2:1.19.6-1ubuntu4.1~16.04.1 2018-10-25 17:06:18 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.1) xenial; urgency=medium

  * prime-sync-refactor.diff: Fix crash on modesetting+amdgpu hybrid.
    (LP: #1789913)

 -- Timo Aaltonen <email address hidden> Wed, 05 Sep 2018 14:31:56 +0300

Source diff to previous version
1789913 X crashes with \

Version: 2:1.19.6-1ubuntu4~16.04.1 2018-07-05 10:07:27 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4~16.04.1) xenial; urgency=medium

  * Backport to xenial (LP: #1772632)
    - Revert dropping patches 105, 188, 191, and disable
      improve-outputclass.diff, in order not to regress nvidia

 -- Timo Aaltonen <email address hidden> Wed, 06 Jun 2018 14:23:44 +0300

Source diff to previous version

Version: 2:1.19.5-0ubuntu2~16.04.1 2018-01-03 13:06:28 UTC

  xorg-server-hwe-16.04 (2:1.19.5-0ubuntu2~16.04.1) xenial; urgency=medium

  * Backport to xenial. (LP: #1716203)
    - disable xwayland-tablet.diff, not needed on xenial
  * control, rules: Drop -dbg package as it got mistakenly added back due
    to a merge. This package had migrated to -dbgsym earlier.

 -- Timo Aaltonen <email address hidden> Tue, 19 Sep 2017 14:52:44 +0300

Source diff to previous version

Version: 2:1.19.3-1ubuntu1~16.04.4 2017-10-17 18:06:55 UTC

  xorg-server-hwe-16.04 (2:1.19.3-1ubuntu1~16.04.4) xenial-security; urgency=medium

  * SECURITY UPDATE: unvalidated extra length in ProcEstablishConnection
    - debian/patches/CVE-2017-12176.patch: add check to dix/dispatch.c.
    - CVE-2017-12176
  * SECURITY UPDATE: Unvalidated variable-length request in
    ProcDbeGetVisualInfo
    - debian/patches/CVE-2017-12177.patch: add check to dbe/dbe.c.
    - CVE-2017-12177
  * SECURITY UPDATE: wrong extra length check in ProcXIChangeHierarchy
    - debian/patches/CVE-2017-12178.patch: fix length check in
      Xi/xichangehierarchy.c.
    - CVE-2017-12178
  * SECURITY UPDATE: integer overflow and unvalidated length in
    ProcXIBarrierReleasePointer
    - debian/patches/CVE-2017-12179-1.patch: test exact size of
      XIBarrierReleasePointer in Xi/xibarriers.c.
    - debian/patches/CVE-2017-12179-2.patch: add checks to Xi/xibarriers.c.
    - CVE-2017-12179
  * SECURITY UPDATE: various unvalidated lengths
    - debian/patches/CVE-2017-12180-12182.patch: add more checks to
      Xext/vidmode.c, hw/xfree86/common/xf86DGA.c,
      hw/xfree86/dri/xf86dri.c.
    - CVE-2017-12180
    - CVE-2017-12181
    - CVE-2017-12182
  * SECURITY UPDATE: more unvalidated lengths
    - debian/patches/CVE-2017-12183.patch: add checks to xfixes/cursor.c,
      xfixes/region.c, xfixes/saveset.c, xfixes/xfixes.c.
    - CVE-2017-12183
  * SECURITY UPDATE: even more unvalidated lengths
    - debian/patches/CVE-2017-12184-12187.patch: add more checks to
      Xext/panoramiX.c, Xext/saver.c, Xext/xres.c, Xext/xvdisp.c,
      hw/dmx/dmxpict.c, pseudoramiX/pseudoramiX.c, render/render.c.
    - CVE-2017-12184
    - CVE-2017-12185
    - CVE-2017-12186
    - CVE-2017-12187
  * debian/patches/os_big_requests.patch: make sure big requests have
    sufficient length in os/io.c.
  * debian/patches/xkb_escape_fix.patch: escape non-printable characters
    correctly in xkb/xkbtext.c.

 -- Marc Deslauriers <email address hidden> Fri, 13 Oct 2017 09:00:49 -0400

Source diff to previous version
CVE-2017-1217 IBM WebSphere Portal 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web
CVE-2017-1218 IBM Tivoli Endpoint Manager is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions t

Version: 2:1.19.3-1ubuntu1~16.04.3 2017-10-12 17:06:54 UTC

  xorg-server-hwe-16.04 (2:1.19.3-1ubuntu1~16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
    - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
      Xext/shm.c.
    - CVE-2017-13721
  * SECURITY UPDATE: buffer overflow via XKB data
    - debian/patches/CVE-2017-13723.patch: handle xkb formatted string
      output safely in xkb/xkbtext.c.
    - CVE-2017-13723

 -- Marc Deslauriers <email address hidden> Wed, 11 Oct 2017 13:56:12 -0400

CVE-2017-1372 IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScri



About   -   Send Feedback to @ubuntu_updates