[ubuntu/plucky-proposed] xwayland 2:24.1.5-1ubuntu1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Wed Feb 26 13:19:17 UTC 2025
xwayland (2:24.1.5-1ubuntu1) plucky; urgency=medium
* SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
in dix/dispatch.c.
- debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
in dix/main.c.
- CVE-2025-26594
* SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
- debian/patches/CVE-2025-26595.patch: fix bounds check in
xkb/xkbtext.c.
- CVE-2025-26595
* SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
- debian/patches/CVE-2025-26596.patch: fix computation of
XkbSizeKeySyms in xkb/xkb.c.
- CVE-2025-26596
* SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
- debian/patches/CVE-2025-26597.patch: also resize key actions in
xkb/XKBMisc.c.
- CVE-2025-26597
* SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
- debian/patches/CVE-2025-26598.patch: fix barrier device search in
Xi/xibarriers.c.
- CVE-2025-26598
* SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
- debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
composite/compalloc.c.
- debian/patches/CVE-2025-26599-2.patch: initialize border clip even
when pixmap alloc fails in composite/compalloc.c.
- CVE-2025-26599
* SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
- debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
device on removal in dix/devices.c.
- CVE-2025-26600
* SECURITY UPDATE: Use-after-free in SyncInitTrigger()
- debian/patches/CVE-2025-26601-1.patch: do not let sync objects
uninitialized in Xext/sync.c.
- debian/patches/CVE-2025-26601-2.patch: check values before applying
changes in Xext/sync.c.
- debian/patches/CVE-2025-26601-3.patch: do not fail
SyncAddTriggerToSyncObject() in Xext/sync.c.
- debian/patches/CVE-2025-26601-4.patch: apply changes last in
SyncChangeAlarmAttributes() in Xext/sync.c.
- CVE-2025-26601
Date: Wed, 19 Feb 2025 09:56:40 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xwayland/2:24.1.5-1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Wed, 19 Feb 2025 09:56:40 -0500
Source: xwayland
Built-For-Profiles: noudeb
Architecture: source
Version: 2:24.1.5-1ubuntu1
Distribution: plucky
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Changes:
xwayland (2:24.1.5-1ubuntu1) plucky; urgency=medium
.
* SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
in dix/dispatch.c.
- debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
in dix/main.c.
- CVE-2025-26594
* SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
- debian/patches/CVE-2025-26595.patch: fix bounds check in
xkb/xkbtext.c.
- CVE-2025-26595
* SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
- debian/patches/CVE-2025-26596.patch: fix computation of
XkbSizeKeySyms in xkb/xkb.c.
- CVE-2025-26596
* SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
- debian/patches/CVE-2025-26597.patch: also resize key actions in
xkb/XKBMisc.c.
- CVE-2025-26597
* SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
- debian/patches/CVE-2025-26598.patch: fix barrier device search in
Xi/xibarriers.c.
- CVE-2025-26598
* SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
- debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
composite/compalloc.c.
- debian/patches/CVE-2025-26599-2.patch: initialize border clip even
when pixmap alloc fails in composite/compalloc.c.
- CVE-2025-26599
* SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
- debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
device on removal in dix/devices.c.
- CVE-2025-26600
* SECURITY UPDATE: Use-after-free in SyncInitTrigger()
- debian/patches/CVE-2025-26601-1.patch: do not let sync objects
uninitialized in Xext/sync.c.
- debian/patches/CVE-2025-26601-2.patch: check values before applying
changes in Xext/sync.c.
- debian/patches/CVE-2025-26601-3.patch: do not fail
SyncAddTriggerToSyncObject() in Xext/sync.c.
- debian/patches/CVE-2025-26601-4.patch: apply changes last in
SyncChangeAlarmAttributes() in Xext/sync.c.
- CVE-2025-26601
Checksums-Sha1:
0aaf88a2d769f495548d2eebcf6fbac5c02e6874 2635 xwayland_24.1.5-1ubuntu1.dsc
d11d7b8df36be78e623504b09e634d5779039969 42720 xwayland_24.1.5-1ubuntu1.debian.tar.xz
c811cde3588bce6876e9b674b5655de55cc377c0 10385 xwayland_24.1.5-1ubuntu1_source.buildinfo
Checksums-Sha256:
18335d060dc8fbc70875337636bd414cfa7ea4fe2d59ccba6ff684327d6e3fc9 2635 xwayland_24.1.5-1ubuntu1.dsc
0647369da6ac1afb53298faed6ffb9aea1db14e7eb7f53b4b843908aca07e31e 42720 xwayland_24.1.5-1ubuntu1.debian.tar.xz
bd5333e70c5477b1392ad63efd9bcb8b2ddeafea3ed6a847cc4d4a61fefbf5f9 10385 xwayland_24.1.5-1ubuntu1_source.buildinfo
Files:
1c103818536147c715067319cb2ac934 2635 x11 optional xwayland_24.1.5-1ubuntu1.dsc
02c84456d224251c6cbda745396e9ff3 42720 x11 optional xwayland_24.1.5-1ubuntu1.debian.tar.xz
6fdac6eb33d5556807b96d5727f0ab43 10385 x11 optional xwayland_24.1.5-1ubuntu1_source.buildinfo
Original-Maintainer: Debian X Strike Force <debian-x at lists.debian.org>
More information about the plucky-changes
mailing list