Bug#485746: [INTL:id] xorg updates for Indonesian

2008-06-11 Thread Arief S Fitrianto
Package: xorg
Tags: l10n patch
Severity: wishlist


This is the Indonesian translation update for xorg/debconf-po package
Thanks in advance.



-- 
Arief S Fitrianto
Departemen Fisika Universitas Indonesia



id.po
Description: application/gettext


Re: mesa: Changes to 'debian-unstable'

2008-06-11 Thread Michel Dänzer
On Tue, 2008-06-10 at 23:25 +0200, Brice Goglin wrote:
> > diff --git a/debian/changelog b/debian/changelog
> > --- a/debian/changelog
> > +++ b/debian/changelog
> > @@ -1,3 +1,12 @@
> > +mesa (7.0.3-2) UNRELEASED; urgency=low
> > +
> > +  * Pull from mesa_7_0_branch (6f4c8b5b).
> > +  * Set right cliprects for the current draw region on Intel, closes: 
> > #467319.
> > +  * Use BRW_TEXCOORDMODE_CLAMP instead of BRW_TEXCOORDMODE_CLAMP_BORDER
> > +to implement GL_CLAMP on i965, closes: #478880.
> > +
> > + -- Brice Goglin <[EMAIL PROTECTED]>  Tue, 10 Jun 2008 23:15:21 +0200
> >   
> 
> I will upload this by the end of the week so that it can easily enter
> testing before the libs get frozen.
> 
> Michel, since this will be the Mesa for Lenny, do you think we should
> cherry-pick "r300: disable the lowimpact fallbacks by default"?

Yeah, I just cherry-picked it upstream.


-- 
Earthling Michel Dänzer   |  http://tungstengraphics.com
Libre software enthusiast |  Debian, X and DRI developer


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485775: dependence between compiz-foo and libdecoration

2008-06-11 Thread Daniele Ferro

Package: compiz
Version: 0.7.6-3

After replacing all my compiz related packages to the version >=
0.7.6-1, the problem reported in bug #483819 was still not solved.
The output with the command "compiz --replace" was this:

[EMAIL PROTECTED]:~$ compiz --replace
Checking for Xgl: not present.
Detected PCI ID for VGA:
Checking for texture_from_pixmap: present.
Checking for non power of two support: present.
Checking for Composite extension: present.
Comparing resolution (1280x1024) to maximum 3D texture size (8192): Passed.
Checking for nVidia: present.
Checking for FBConfig: present.
Checking for Xgl: not present.
Starting gtk-window-decorator
/usr/bin/gtk-window-decorator: symbol lookup error: 
/usr/bin/gtk-window-decorator: undefined symbol: decor_blend_border_picture

Backend : ini
Integration : true
Profile : default
Adding plugin trailfocus (trailfocus)
Adding plugin fadedesktop (fadedesktop)
Adding plugin fs (fs)
Adding plugin 3d (3d)
Adding plugin widget (widget)
Adding plugin expo (expo)
Adding plugin water (water)
Adding plugin ring (ring)
Adding plugin notification (notification)
Adding plugin group (group)
Adding plugin imgjpeg (imgjpeg)
Adding plugin bs (bs)
Adding plugin screenshot (screenshot)
Adding plugin place (place)
Adding plugin addhelper (addhelper)
Adding plugin snap (snap)
Adding plugin mblur (mblur)
Adding plugin shelf (shelf)
Adding plugin switcher (switcher)
Adding plugin move (move)
Adding plugin thumbnail (thumbnail)
Adding plugin inotify (inotify)
Adding plugin svg (svg)
Adding plugin extrawm (extrawm)
Adding plugin workarounds (workarounds)
Adding plugin neg (neg)
Adding plugin resize (resize)
Adding plugin crashhandler (crashhandler)
Adding plugin scaleaddon (scaleaddon)
Adding plugin annotate (annotate)
Adding plugin put (put)
Adding plugin scalefilter (scalefilter)
Adding plugin cubeaddon (cubeaddon)
Adding plugin loginout (loginout)
Adding plugin bench (bench)
Adding plugin wobbly (wobbly)
Adding plugin session (session)
Adding plugin colorfilter (colorfilter)
Adding plugin cube (cube)
Adding plugin text (text)
Adding plugin png (png)
Adding plugin showdesktop (showdesktop)
Adding plugin dbus (dbus)
Adding plugin gears (gears)
Adding plugin vpswitch (vpswitch)
Adding plugin winrules (winrules)
Adding core settings (General Options)
Adding plugin blur (blur)
Adding plugin animation (animation)
Adding plugin zoom (zoom)
Adding plugin shift (shift)
Adding plugin mousepoll (mousepoll)
Adding plugin decoration (decoration)
Adding plugin rotate (rotate)
Adding plugin fade (fade)
Adding plugin bicubic (bicubic)
Adding plugin staticswitcher (staticswitcher)
Adding plugin mag (mag)
Adding plugin splash (splash)
Adding plugin clone (clone)
Adding plugin firepaint (firepaint)
Adding plugin wallpaper (wallpaper)
Adding plugin showmouse (showmouse)
Adding plugin reflex (reflex)
Adding plugin wall (wall)
Adding plugin minimize (minimize)
Adding plugin maximumize (maximumize)
Adding plugin ezoom (ezoom)
Adding plugin regex (regex)
Adding plugin resizeinfo (resizeinfo)
Adding plugin glib (glib)
Adding plugin opacify (opacify)
Adding plugin video (video)
Adding plugin scale (scale)
Initializing core options...done
Initializing place options...done
Initializing move options...done
Initializing resize options...done
Initializing winrules options...done
Initializing decoration options...done
Initializing widget options...done
Initializing wobbly options...done
Initializing fade options...done
Initializing trailfocus options...done
/usr/bin/compiz.real (trailfocus) - Warn: Attempting to define start 
higher than max windows.
/usr/bin/compiz.real (trailfocus) - Warn: Attempting to define start 
higher than max windows.
/usr/bin/compiz.real (trailfocus) - Warn: Attempting to define start 
higher than max windows.

Initializing cube options...done
gtk-window-decorator: symbol lookup error: gtk-window-decorator: 
undefined symbol: decor_blend_border_picture

Initializing rotate options...done
Initializing switcher options...done
Setting Update "mode"
Setting Update "above_match"
Setting Update "command"
Setting Update "shadow_match"
Setting Update "snap_inverted"
Setting Update "windows_count"
Setting Update "windows_start"
Setting Update "min_opacity"
Setting Update "timestep"
Setting Update "opacity"
Setting Update "bring_to_front"
Setting Update "zoom"
*** glibc detected *** /usr/bin/compiz.real: double free or corruption 
(!prev): 0x0886d860 ***

=== Backtrace: =
/lib/i686/cmov/libc.so.6[0xb7c898f5]
/lib/i686/cmov/libc.so.6(cfree+0x90)[0xb7c8d360]
/usr/lib/libGL.so.1[0xb7dd3851]
=== Memory map: 
08048000-0807b000 r-xp  08:03 16572  /usr/bin/compiz.real
0807b000-0807c000 rw-p 00032000 08:03 16572  /usr/bin/compiz.real
0807c000-0894a000 rw-p 0807c000 00:00 0  [heap]
b52e4000-b54e4000 rw-s 34f21000 00:0d 6508   /dev/nvidia0
b6168000-b616e000 r-xp  08:03 263946 /usr/lib/compiz/libswitcher.so
b616e000-b616f000 rw-p 5000 08:03 2

Bug#485775: dependence between compiz-foo and libdecoration

2008-06-11 Thread Julien Cristau
On Wed, Jun 11, 2008 at 13:27:31 +0200, Daniele Ferro wrote:

> After replacing all my compiz related packages to the version >=
> 0.7.6-1, the problem reported in bug #483819 was still not solved.
> The output with the command "compiz --replace" was this:
>
> [EMAIL PROTECTED]:~$ compiz --replace
[...]
> gtk-window-decorator: symbol lookup error: gtk-window-decorator:  
> undefined symbol: decor_blend_border_picture
>
> To make compiz work again I had to replace the package libdecoration too  
> with the sid version (0.7.6-3), so it seems there's a strong dependence  
> between compiz-foo and libdecoration.

libdecoration0.shlibs still says 'libdecoration0 (>= 0.5.0)', which
seems wrong.  I guess that should be bumped to 0.7.6. Sean?

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processing of xorg-server_1.4.1~git20080517-2_i386.changes

2008-06-11 Thread Archive Administrator
xorg-server_1.4.1~git20080517-2_i386.changes uploaded successfully to localhost
along with the files:
  xorg-server_1.4.1~git20080517-2.dsc
  xorg-server_1.4.1~git20080517-2.diff.gz
  xprint-common_1.4.1~git20080517-2_all.deb
  xserver-xorg-core_1.4.1~git20080517-2_i386.deb
  xserver-xorg-dev_1.4.1~git20080517-2_i386.deb
  xdmx_1.4.1~git20080517-2_i386.deb
  xdmx-tools_1.4.1~git20080517-2_i386.deb
  xnest_1.4.1~git20080517-2_i386.deb
  xvfb_1.4.1~git20080517-2_i386.deb
  xserver-xephyr_1.4.1~git20080517-2_i386.deb
  xprint_1.4.1~git20080517-2_i386.deb
  xserver-xorg-core-dbg_1.4.1~git20080517-2_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xorg-server_1.4.1~git20080517-2_i386.changes ACCEPTED

2008-06-11 Thread Debian Installer

Accepted:
xdmx-tools_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xdmx-tools_1.4.1~git20080517-2_i386.deb
xdmx_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xdmx_1.4.1~git20080517-2_i386.deb
xnest_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xnest_1.4.1~git20080517-2_i386.deb
xorg-server_1.4.1~git20080517-2.diff.gz
  to pool/main/x/xorg-server/xorg-server_1.4.1~git20080517-2.diff.gz
xorg-server_1.4.1~git20080517-2.dsc
  to pool/main/x/xorg-server/xorg-server_1.4.1~git20080517-2.dsc
xprint-common_1.4.1~git20080517-2_all.deb
  to pool/main/x/xorg-server/xprint-common_1.4.1~git20080517-2_all.deb
xprint_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xprint_1.4.1~git20080517-2_i386.deb
xserver-xephyr_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xserver-xephyr_1.4.1~git20080517-2_i386.deb
xserver-xorg-core-dbg_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xserver-xorg-core-dbg_1.4.1~git20080517-2_i386.deb
xserver-xorg-core_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xserver-xorg-core_1.4.1~git20080517-2_i386.deb
xserver-xorg-dev_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xserver-xorg-dev_1.4.1~git20080517-2_i386.deb
xvfb_1.4.1~git20080517-2_i386.deb
  to pool/main/x/xorg-server/xvfb_1.4.1~git20080517-2_i386.deb


Override entries for your package:
xdmx-tools_1.4.1~git20080517-2_i386.deb - optional x11
xdmx_1.4.1~git20080517-2_i386.deb - optional x11
xnest_1.4.1~git20080517-2_i386.deb - optional x11
xorg-server_1.4.1~git20080517-2.dsc - source x11
xprint-common_1.4.1~git20080517-2_all.deb - optional x11
xprint_1.4.1~git20080517-2_i386.deb - optional x11
xserver-xephyr_1.4.1~git20080517-2_i386.deb - optional x11
xserver-xorg-core-dbg_1.4.1~git20080517-2_i386.deb - extra x11
xserver-xorg-core_1.4.1~git20080517-2_i386.deb - optional x11
xserver-xorg-dev_1.4.1~git20080517-2_i386.deb - optional x11
xvfb_1.4.1~git20080517-2_i386.deb - optional x11

Announcing to [EMAIL PROTECTED]


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xorg-server: Changes to 'debian-unstable'

2008-06-11 Thread Julien Cristau
 debian/changelog  |   13 
 debian/patches/idef-apr08-v3-xserver-1.4.diff |  203 +
 debian/patches/series |1 
 debian/xsfbs/xsfbs.mk |   22 -
 debian/xsfbs/xsfbs.sh |  387 ++
 5 files changed, 432 insertions(+), 194 deletions(-)

New commits:
commit 2c939ed7ca3dfd7d04832d3b158690ed4f2b5073
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Mon Jun 9 15:17:04 2008 +0200

Prepare changelog for upload

diff --git a/debian/changelog b/debian/changelog
index 7cf44fc..4426246 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
-xorg-server (2:1.4.1~git20080517-2) UNRELEASED; urgency=high
+xorg-server (2:1.4.1~git20080517-2) unstable; urgency=high
 
   * High urgency upload for security fixes.
   * New patch from upstream to fix multiple security issues reported by
@@ -9,7 +9,7 @@ xorg-server (2:1.4.1~git20080517-2) UNRELEASED; urgency=high
 CVE-2008-1379 - MIT-SHM arbitrary memory read
 CVE-2008-1377 - RECORD and Security extensions memory corruption
 
- -- Julien Cristau <[EMAIL PROTECTED]>  Sat, 17 May 2008 18:48:08 +0200
+ -- Julien Cristau <[EMAIL PROTECTED]>  Mon, 09 Jun 2008 14:59:04 +0200
 
 xorg-server (2:1.4.1~git20080517-1) unstable; urgency=low
 

commit 4c2fb5aa80a15b5a9a9b51b03c7dc30496a22561
Author: Brice Goglin <[EMAIL PROTECTED]>
Date:   Sat May 31 13:23:24 2008 +0200

Update xsfbs/quilt patching rules to be compatible with the
"3.0 (quilt)" source package.

Thanks to Raphael Hertzog.
See http://lists.debian.org/debian-x/2008/05/msg01250.html for details.

diff --git a/debian/xsfbs/xsfbs.mk b/debian/xsfbs/xsfbs.mk
index c11923f..b871b3b 100755
--- a/debian/xsfbs/xsfbs.mk
+++ b/debian/xsfbs/xsfbs.mk
@@ -21,10 +21,8 @@
 # Pass $(DH_OPTIONS) into the environment for debhelper's benefit.
 export DH_OPTIONS
 
-# force quilt to not use ~/.quiltrc
-QUILT = quilt --quiltrc /dev/null
-# force QUILT_PATCHES to the default in case it is exported in the environment
-QUILT_PATCHES = patches/
+# force quilt to not use ~/.quiltrc and to use debian/patches
+QUILT = QUILT_PATCHES=debian/patches quilt --quiltrc /dev/null
 
 # Set up parameters for the upstream build environment.
 
@@ -121,19 +119,11 @@ $(STAMP_DIR)/stampdir:
 # Set up the package build directory as quilt expects to find it.
 .PHONY: prepare
 stampdir_targets+=prepare
-prepare: $(STAMP_DIR)/genscripts $(STAMP_DIR)/prepare $(STAMP_DIR)/patches 
$(STAMP_DIR)/log
+prepare: $(STAMP_DIR)/genscripts $(STAMP_DIR)/prepare $(STAMP_DIR)/log
 $(STAMP_DIR)/prepare: $(STAMP_DIR)/stampdir
-   if [ ! -e $(STAMP_DIR)/patches ]; then \
-   mkdir $(STAMP_DIR)/patches; \
-   ln -s $(STAMP_DIR)/patches .pc; \
-   echo 2 >$(STAMP_DIR)/patches/.version; \
-   fi; \
if [ ! -e $(STAMP_DIR)/log ]; then \
mkdir $(STAMP_DIR)/log; \
fi; \
-   if [ -e debian/patches ] && [ ! -e patches ]; then \
-   ln -s debian/patches patches; \
-   fi; \
>$@
 
 # Apply all patches to the upstream source.
@@ -162,10 +152,10 @@ $(STAMP_DIR)/patch: $(STAMP_DIR)/prepare
 
 # Revert all patches to the upstream source.
 .PHONY: unpatch
-unpatch:
+unpatch: $(STAMP_DIR)/prepare
rm -f $(STAMP_DIR)/patch
@echo -n "Unapplying patches..."; \
-   if [ -e $(STAMP_DIR)/patches/applied-patches ]; then \
+   if $(QUILT) applied >/dev/null 2>/dev/null; then \
  if $(QUILT) pop -a -v >$(STAMP_DIR)/log/unpatch 2>&1; then \
cat $(STAMP_DIR)/log/unpatch; \
echo "successful."; \
@@ -192,7 +182,7 @@ cleanscripts:
 .PHONY: xsfclean
 xsfclean: cleanscripts unpatch
dh_testdir
-   rm -rf .pc patches
+   rm -rf .pc
rm -rf $(STAMP_DIR) $(SOURCE_DIR)
rm -rf imports
dh_clean debian/shlibs.local \

commit dcf4204d5328834172df80951a18de014b0f74ef
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Fri May 30 12:26:18 2008 +0200

xsfbs.sh: use 'local' now that policy allows it

Policy 3.7.3 allows /bin/sh scripts to use 'local'.

diff --git a/debian/xsfbs/xsfbs.sh b/debian/xsfbs/xsfbs.sh
index 0c7607a..72efa95 100644
--- a/debian/xsfbs/xsfbs.sh
+++ b/debian/xsfbs/xsfbs.sh
@@ -238,19 +238,19 @@ analyze_path () {
   # analyze_path /usr/X11R6/bin -> ls -dl /usr /usr/X11R6 /usr/X11R6/bin
   # Thanks to Randolph Chung for this clever hack.
 
-  #local f g
+  local f g
 
   while [ -n "$1" ]; do
 reject_whitespace "$1"
-_g=
+g=
 message "Analyzing $1:"
-for _f in $(echo "$1" | tr / \  ); do
-  if [ -e /$_g$_f ]; then
-ls -dl /$_g$_f /$_g$_f.dpkg-* 2> /dev/null || true
-_g=$_g$_f/
+for f in $(echo "$1" | tr / \  ); do
+  if [ -e /$g$f ]; then
+ls -dl /$g$f /$g$f.dpkg-* 2> /dev/null || true
+g=$g$f/
   else
-message "/$_g$_f: nonexistent; directory contents of /$_g:

xorg-server: Changes to 'refs/tags/xorg-server-2_1.4.1-git20080517-2'

2008-06-11 Thread Julien Cristau
Tag 'xorg-server-2_1.4.1-git20080517-2' created by Julien Cristau <[EMAIL 
PROTECTED]> at 2008-06-11 14:22 +

Tagging upload of xorg-server 2:1.4.1~git20080517-2 to unstable.

Changes since xorg-server-2_1.4.1-git20080517-1:
Brice Goglin (1):
  Update xsfbs/quilt patching rules to be compatible with the

Julien Cristau (6):
  Remove the .pc directory properly
  Fix multiple security issues
  xsfbs.sh: add remove_conffile_lookup
  xsfbs.sh: use 'local' now that policy allows it
  Merge branch 'debian-unstable' of git.debian.org:/git/pkg-xorg/xsfbs into 
debian-unstable
  Prepare changelog for upload

---
 debian/changelog  |   13 
 debian/patches/idef-apr08-v3-xserver-1.4.diff |  203 +
 debian/patches/series |1 
 debian/xsfbs/xsfbs.mk |   22 -
 debian/xsfbs/xsfbs.sh |  387 ++
 5 files changed, 432 insertions(+), 194 deletions(-)
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



mesa: Changes to 'upstream-unstable'

2008-06-11 Thread Brice Goglin
 src/mesa/drivers/dri/i915/i915_context.h|6 +++
 src/mesa/drivers/dri/i915/i915_fragprog.c   |   56 +---
 src/mesa/drivers/dri/i915/i915_program.c|   38 +--
 src/mesa/drivers/dri/i915/i915_program.h|1 
 src/mesa/drivers/dri/i915/i915_texprog.c|2 -
 src/mesa/drivers/dri/i915/intel_tex.c   |2 -
 src/mesa/drivers/dri/radeon/radeon_screen.c |2 -
 src/mesa/shader/program.c   |2 -
 8 files changed, 87 insertions(+), 22 deletions(-)

New commits:
commit 03447de338158cca962880fd04d7d3ecf4bd9c5b
Author: Brian <[EMAIL PROTECTED]>
Date:   Mon Oct 29 10:01:15 2007 -0600

disable ctx->Driver.NewProgram() call in _mesa_new_program()

This was causing infinite recursive calls w/ software drivers.
All vertex/fragment shaders should be allocated by calling
ctx->Driver.NewProgram(), not by calling _mesa_new_program().

(Cherry picked from commit 40133487dbdd14456a8a4f6a5716f57a36eb1ea7,
351a83163a9536dc91014cc59bb406a10cd26df4).

diff --git a/src/mesa/shader/program.c b/src/mesa/shader/program.c
index 12fcb67..a898370 100644
--- a/src/mesa/shader/program.c
+++ b/src/mesa/shader/program.c
@@ -241,8 +241,6 @@ _mesa_init_vertex_program( GLcontext *ctx, struct 
gl_vertex_program *prog,
 struct gl_program *
 _mesa_new_program(GLcontext *ctx, GLenum target, GLuint id)
 {
-   if (ctx->Driver.NewProgram)
-return ctx->Driver.NewProgram(ctx, target, id);
switch (target) {
case GL_VERTEX_PROGRAM_ARB: /* == GL_VERTEX_PROGRAM_NV */
   return _mesa_init_vertex_program(ctx, CALLOC_STRUCT(gl_vertex_program),

commit ee5f4a4caf894dd7d91a8146af589bb18751a7bb
Author: Dave Airlie <[EMAIL PROTECTED]>
Date:   Sun Jun 1 09:32:55 2008 +1000

r300: disable the lowimpact fallbacks by default.

because really we should be able to just fix the driver.
(cherry picked from commit 7013eecf282d2b1151cdb5cd3ba356295e1e1b79)

There are actually even better reasons for this, the bottom line being that
enabling these fallbacks makes a lot of apps unusable mostly for no gain
whatsoever.

diff --git a/src/mesa/drivers/dri/radeon/radeon_screen.c 
b/src/mesa/drivers/dri/radeon/radeon_screen.c
index 0c86b22..fd6b59d 100644
--- a/src/mesa/drivers/dri/radeon/radeon_screen.c
+++ b/src/mesa/drivers/dri/radeon/radeon_screen.c
@@ -188,7 +188,7 @@ DRI_CONF_BEGIN
DRI_CONF_MAX_TEXTURE_IMAGE_UNITS(8, 2, 8)
DRI_CONF_MAX_TEXTURE_COORD_UNITS(8, 2, 8)
DRI_CONF_COMMAND_BUFFER_SIZE(8, 8, 32)
-   DRI_CONF_DISABLE_FALLBACK(false)
+   DRI_CONF_DISABLE_FALLBACK(true)
DRI_CONF_DISABLE_DOUBLE_SIDE_STENCIL(false)
DRI_CONF_SECTION_END
DRI_CONF_SECTION_QUALITY

commit c04f3933abd5dbacf8ac1c7f35ded0384b19da48
Author: Xiang, Haihao <[EMAIL PROTECTED]>
Date:   Wed Jun 11 11:36:01 2008 +0800

i915: fix fd.o #14966

diff --git a/src/mesa/drivers/dri/i915/intel_tex.c 
b/src/mesa/drivers/dri/i915/intel_tex.c
index 5bd2806..8460134 100644
--- a/src/mesa/drivers/dri/i915/intel_tex.c
+++ b/src/mesa/drivers/dri/i915/intel_tex.c
@@ -759,7 +759,7 @@ int intelUploadTexImages( intelContextPtr intel,
  GLuint face)
 {
const int numLevels = t->base.lastLevel - t->base.firstLevel + 1;
-   const struct gl_texture_image *firstImage = 
t->image[face][t->base.firstLevel].image;
+   const struct gl_texture_image *firstImage = t->image[face][0].image;
int pitch = firstImage->RowStride * firstImage->TexFormat->TexelBytes;
 
/* Can we texture out of the existing client data? */

commit 8f328c45e5d51b738c8747400aae4b694905a26d
Author: Xiang, Haihao <[EMAIL PROTECTED]>
Date:   Mon Jan 7 14:08:36 2008 +0800

i915: Keith Whitwell's swizzling TEX patch. fix #8283

Cherry picked from commit 3369cd9a6f943365242d7832e69788d4aede9a8f

diff --git a/src/mesa/drivers/dri/i915/i915_context.h 
b/src/mesa/drivers/dri/i915/i915_context.h
index ec15501..7b51d77 100644
--- a/src/mesa/drivers/dri/i915/i915_context.h
+++ b/src/mesa/drivers/dri/i915/i915_context.h
@@ -29,6 +29,7 @@
 #define I915CONTEXT_INC
 
 #include "intel_context.h"
+#include "i915_reg.h"
 
 #define I915_FALLBACK_TEXTURE   0x1000
 #define I915_FALLBACK_COLORMASK 0x2000
@@ -103,6 +104,7 @@
 
 #define I915_PROGRAM_SIZE  192
 
+#define I915_MAX_INSN  (I915_MAX_TEX_INSN+I915_MAX_ALU_INSN)
 
 /* Hardware version of a parsed fragment program.  "Derived" from the
  * mesa fragment_program struct.
@@ -153,6 +155,10 @@ struct i915_fragment_program {
 */
 
 
+   /* Track which R registers are "live" for each instruction.
+* A register is live between the time it's written to and the last time
+* it's read. */
+   GLuint usedRegs[I915_MAX_INSN];
 
/* Helpers for i915_fragprog.c:
 */
diff --git a/src/mesa/drivers/dri/i915/i915_fragprog.c 
b/src/mesa/drivers/dri

mesa: Changes to 'debian-unstable'

2008-06-11 Thread Brice Goglin
 debian/changelog|7 ++-
 src/mesa/drivers/dri/i915/i915_context.h|6 +++
 src/mesa/drivers/dri/i915/i915_fragprog.c   |   56 +---
 src/mesa/drivers/dri/i915/i915_program.c|   38 +--
 src/mesa/drivers/dri/i915/i915_program.h|1 
 src/mesa/drivers/dri/i915/i915_texprog.c|2 -
 src/mesa/drivers/dri/i915/intel_tex.c   |2 -
 src/mesa/drivers/dri/radeon/radeon_screen.c |2 -
 src/mesa/shader/program.c   |2 -
 9 files changed, 92 insertions(+), 24 deletions(-)

New commits:
commit 2fa795a213ff2671556817dc8f0d57525267cef0
Author: Brice Goglin <[EMAIL PROTECTED]>
Date:   Wed Jun 11 18:59:59 2008 +0200

Pull from mesa_7_0_branch

diff --git a/debian/changelog b/debian/changelog
index a340b44..04ae30c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,11 +1,14 @@
 mesa (7.0.3-2) UNRELEASED; urgency=low
 
-  * Pull from mesa_7_0_branch (6f4c8b5b).
+  * Pull from mesa_7_0_branch (03447de3).
   * Set right cliprects for the current draw region on Intel, closes: #467319.
   * Use BRW_TEXCOORDMODE_CLAMP instead of BRW_TEXCOORDMODE_CLAMP_BORDER
 to implement GL_CLAMP on i965, closes: #478880.
+  * Fix segment fault with BASE_LEVEL set to 5 for MipMap on i915,
+closes: #451339.
+  * Disable low impact fallback on r300 by default, closes: #440868.
 
- -- Brice Goglin <[EMAIL PROTECTED]>  Tue, 10 Jun 2008 23:15:21 +0200
+ -- Brice Goglin <[EMAIL PROTECTED]>  Wed, 11 Jun 2008 10:56:08 +0200
 
 mesa (7.0.3-1) unstable; urgency=low
 

commit 03447de338158cca962880fd04d7d3ecf4bd9c5b
Author: Brian <[EMAIL PROTECTED]>
Date:   Mon Oct 29 10:01:15 2007 -0600

disable ctx->Driver.NewProgram() call in _mesa_new_program()

This was causing infinite recursive calls w/ software drivers.
All vertex/fragment shaders should be allocated by calling
ctx->Driver.NewProgram(), not by calling _mesa_new_program().

(Cherry picked from commit 40133487dbdd14456a8a4f6a5716f57a36eb1ea7,
351a83163a9536dc91014cc59bb406a10cd26df4).

diff --git a/src/mesa/shader/program.c b/src/mesa/shader/program.c
index 12fcb67..a898370 100644
--- a/src/mesa/shader/program.c
+++ b/src/mesa/shader/program.c
@@ -241,8 +241,6 @@ _mesa_init_vertex_program( GLcontext *ctx, struct 
gl_vertex_program *prog,
 struct gl_program *
 _mesa_new_program(GLcontext *ctx, GLenum target, GLuint id)
 {
-   if (ctx->Driver.NewProgram)
-return ctx->Driver.NewProgram(ctx, target, id);
switch (target) {
case GL_VERTEX_PROGRAM_ARB: /* == GL_VERTEX_PROGRAM_NV */
   return _mesa_init_vertex_program(ctx, CALLOC_STRUCT(gl_vertex_program),

commit ee5f4a4caf894dd7d91a8146af589bb18751a7bb
Author: Dave Airlie <[EMAIL PROTECTED]>
Date:   Sun Jun 1 09:32:55 2008 +1000

r300: disable the lowimpact fallbacks by default.

because really we should be able to just fix the driver.
(cherry picked from commit 7013eecf282d2b1151cdb5cd3ba356295e1e1b79)

There are actually even better reasons for this, the bottom line being that
enabling these fallbacks makes a lot of apps unusable mostly for no gain
whatsoever.

diff --git a/src/mesa/drivers/dri/radeon/radeon_screen.c 
b/src/mesa/drivers/dri/radeon/radeon_screen.c
index 0c86b22..fd6b59d 100644
--- a/src/mesa/drivers/dri/radeon/radeon_screen.c
+++ b/src/mesa/drivers/dri/radeon/radeon_screen.c
@@ -188,7 +188,7 @@ DRI_CONF_BEGIN
DRI_CONF_MAX_TEXTURE_IMAGE_UNITS(8, 2, 8)
DRI_CONF_MAX_TEXTURE_COORD_UNITS(8, 2, 8)
DRI_CONF_COMMAND_BUFFER_SIZE(8, 8, 32)
-   DRI_CONF_DISABLE_FALLBACK(false)
+   DRI_CONF_DISABLE_FALLBACK(true)
DRI_CONF_DISABLE_DOUBLE_SIDE_STENCIL(false)
DRI_CONF_SECTION_END
DRI_CONF_SECTION_QUALITY

commit c04f3933abd5dbacf8ac1c7f35ded0384b19da48
Author: Xiang, Haihao <[EMAIL PROTECTED]>
Date:   Wed Jun 11 11:36:01 2008 +0800

i915: fix fd.o #14966

diff --git a/src/mesa/drivers/dri/i915/intel_tex.c 
b/src/mesa/drivers/dri/i915/intel_tex.c
index 5bd2806..8460134 100644
--- a/src/mesa/drivers/dri/i915/intel_tex.c
+++ b/src/mesa/drivers/dri/i915/intel_tex.c
@@ -759,7 +759,7 @@ int intelUploadTexImages( intelContextPtr intel,
  GLuint face)
 {
const int numLevels = t->base.lastLevel - t->base.firstLevel + 1;
-   const struct gl_texture_image *firstImage = 
t->image[face][t->base.firstLevel].image;
+   const struct gl_texture_image *firstImage = t->image[face][0].image;
int pitch = firstImage->RowStride * firstImage->TexFormat->TexelBytes;
 
/* Can we texture out of the existing client data? */

commit 8f328c45e5d51b738c8747400aae4b694905a26d
Author: Xiang, Haihao <[EMAIL PROTECTED]>
Date:   Mon Jan 7 14:08:36 2008 +0800

i915: Keith Whitwell's swizzling TEX patch. fix #8283

Cherry picked from commit 3369cd9a6f943365242d7832e69788d4aede9a8f

diff --git a/src/mesa/drivers/dri/i

xorg-server: Changes to 'upstream-unstable'

2008-06-11 Thread Julien Cristau
 Xext/security.c |   10 +++---
 Xext/shm.c  |   13 +++--
 Xi/exevents.c   |   11 ---
 configure.ac|4 ++--
 dix/getevents.c |2 +-
 record/record.c |   16 +---
 render/glyph.c  |   14 --
 render/render.c |   18 ++
 8 files changed, 68 insertions(+), 20 deletions(-)

New commits:
commit c3a7903f6a6a27e53ba0372408e0c5a68c608e86
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Wed Jun 11 16:27:10 2008 +0200

Bump to 1.4.2

And update release date.

diff --git a/configure.ac b/configure.ac
index c64117f..f75fc61 100644
--- a/configure.ac
+++ b/configure.ac
@@ -26,7 +26,7 @@ dnl
 dnl Process this file with autoconf to create configure.
 
 AC_PREREQ(2.57)
-AC_INIT([xorg-server], 1.4.1, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
+AC_INIT([xorg-server], 1.4.2, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
 AC_CONFIG_SRCDIR([Makefile.am])
 AM_INIT_AUTOMAKE([dist-bzip2 foreign])
 AM_MAINTAINER_MODE
@@ -392,7 +392,7 @@ VENDOR_MAN_VERSION="Version ${PACKAGE_VERSION}"
 
 VENDOR_NAME="The X.Org Foundation"
 VENDOR_NAME_SHORT="X.Org"
-RELEASE_DATE="5 September 2007"
+RELEASE_DATE="11 June 2008"
 VENDOR_WEB="http://wiki.x.org";
 
 m4_ifdef([AS_HELP_STRING], , [m4_define([AS_HELP_STRING], 
m4_defn([AC_HELP_STRING]))])

commit 08e6292e7efff518730e3c54f3a082c6139d618d
Author: Matthieu Herrb <[EMAIL PROTECTED]>
Date:   Sun Jun 8 11:16:23 2008 -0600

CVE-2008-1379 - MIT-SHM arbitrary memory read

An integer overflow in the validation of the parameters of the
ShmPutImage() request makes it possible to trigger the copy of
arbitrary server memory to a pixmap that can subsequently be read by
the client, to read arbitrary parts of the X server memory space.

diff --git a/Xext/shm.c b/Xext/shm.c
index 3c0d1ee..de908cf 100644
--- a/Xext/shm.c
+++ b/Xext/shm.c
@@ -848,8 +848,17 @@ ProcShmPutImage(client)
 return BadValue;
 }
 
-VERIFY_SHMSIZE(shmdesc, stuff->offset, length * stuff->totalHeight,
-  client);
+/* 
+ * There's a potential integer overflow in this check:
+ * VERIFY_SHMSIZE(shmdesc, stuff->offset, length * stuff->totalHeight,
+ *client);
+ * the version below ought to avoid it
+ */
+if (stuff->totalHeight != 0 && 
+   length > (shmdesc->size - stuff->offset)/stuff->totalHeight) {
+   client->errorValue = stuff->totalWidth;
+   return BadValue;
+}
 if (stuff->srcX > stuff->totalWidth)
 {
client->errorValue = stuff->srcX;

commit 8ffaf613705a915c4b53ae11096dacd786fd1d22
Author: Matthieu Herrb <[EMAIL PROTECTED]>
Date:   Sun Jun 8 11:16:55 2008 -0600

CVE-2008-1377 - RECORD and Security extensions memory corruption

Lack of validation of the parameters of the
SProcSecurityGenerateAuthorization SProcRecordCreateContext
functions makes it possible for a specially crafted request to trigger
the swapping of bytes outside the parameter of these requests, causing
memory corruption.

diff --git a/Xext/security.c b/Xext/security.c
index 14ad354..a8a75ea 100644
--- a/Xext/security.c
+++ b/Xext/security.c
@@ -651,15 +651,19 @@ SProcSecurityGenerateAuthorization(
 register char  n;
 CARD32 *values;
 unsigned long nvalues;
+int values_offset;
 
 swaps(&stuff->length, n);
 REQUEST_AT_LEAST_SIZE(xSecurityGenerateAuthorizationReq);
 swaps(&stuff->nbytesAuthProto, n);
 swaps(&stuff->nbytesAuthData, n);
 swapl(&stuff->valueMask, n);
-values = (CARD32 *)(&stuff[1]) +
-   ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
-   ((stuff->nbytesAuthData + (unsigned)3) >> 2);
+values_offset = ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
+   ((stuff->nbytesAuthData + (unsigned)3) >> 2);
+if (values_offset > 
+   stuff->length - (sz_xSecurityGenerateAuthorizationReq >> 2))
+   return BadLength;
+values = (CARD32 *)(&stuff[1]) + values_offset;
 nvalues = (((CARD32 *)stuff) + stuff->length) - values;
 SwapLongs(values, nvalues);
 return ProcSecurityGenerateAuthorization(client);
diff --git a/record/record.c b/record/record.c
index 0ed8f84..9a166d6 100644
--- a/record/record.c
+++ b/record/record.c
@@ -2656,7 +2656,7 @@ SProcRecordQueryVersion(ClientPtr client)
 } /* SProcRecordQueryVersion */
 
 
-static void
+static int
 SwapCreateRegister(xRecordRegisterClientsReq *stuff)
 {
 register char n;
@@ -2667,11 +2667,17 @@ SwapCreateRegister(xRecordRegisterClientsReq *stuff)
 swapl(&stuff->nClients, n);
 swapl(&stuff->nRanges, n);
 pClientID = (XID *)&stuff[1];
+if (stuff->nClients > stuff->length - (sz_xRecordRegisterClientsReq >> 2))
+   return BadLength;
 for (i = 0; i < stuff->nClients; i++, pClientID++)
 {
swapl(pClientID, n);
 }
+if (stuff->nRanges > stuff->length - (sz_xRecordRegisterClientsReq >> 2)
+  

xorg-server: Changes to 'debian-unstable'

2008-06-11 Thread Julien Cristau
 ChangeLog |  104 +
 Xext/security.c   |   10 -
 Xext/shm.c|   13 +
 Xi/exevents.c |   11 +
 configure.ac  |4 
 debian/changelog  |9 +
 debian/patches/idef-apr08-v3-xserver-1.4.diff |  203 --
 debian/patches/series |1 
 dix/getevents.c   |2 
 hw/xfree86/modes/xf86Crtc.c   |4 
 record/record.c   |   16 +-
 render/glyph.c|   14 +
 render/render.c   |   18 +-
 13 files changed, 183 insertions(+), 226 deletions(-)

New commits:
commit 4c399327fb8d124bd1ed7da1eca308074fc9141b
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Wed Jun 11 19:07:16 2008 +0200

Update changelog for latest cherry-picked patches

diff --git a/debian/changelog b/debian/changelog
index a33c907..c857473 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -2,6 +2,8 @@ xorg-server (2:1.4.2-1) UNRELEASED; urgency=low
 
   * New upstream release.
   * Security fixes from the previous upload are included upstream.
+  * Cherry-pick patches from upstream git to make the LeftOf and Above options
+in xorg.conf actually work (closes: #466526).
 
  -- Julien Cristau <[EMAIL PROTECTED]>  Wed, 11 Jun 2008 18:57:01 +0200
 

commit 3094028e30ca18b8ec98be7a46cc4e29a746b00b
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Mon May 19 03:15:11 2008 +0200

xfree86: fix initial output positions with Above or LeftOf and rotation

The fix in fa19e84714aa84a2f2e817e363d6440349d0b619 was incomplete,
as it was still using the wrong output's initial rotation to compute
the position.
(cherry picked from commit 82c4075d4ba3bea03341c80b754b0f9d2f62a826)

diff --git a/hw/xfree86/modes/xf86Crtc.c b/hw/xfree86/modes/xf86Crtc.c
index ad206f1..9d93993 100644
--- a/hw/xfree86/modes/xf86Crtc.c
+++ b/hw/xfree86/modes/xf86Crtc.c
@@ -1068,10 +1068,10 @@ xf86InitialOutputPositions (ScrnInfoPtr scrn, 
DisplayModePtr *modes)
output->initial_x += xf86ModeWidth (modes[or], 
relative->initial_rotation);
break;
case OPTION_ABOVE:
-   output->initial_y -= xf86ModeHeight (modes[o], 
relative->initial_rotation);
+   output->initial_y -= xf86ModeHeight (modes[o], 
output->initial_rotation);
break;
case OPTION_LEFT_OF:
-   output->initial_x -= xf86ModeWidth (modes[o], 
relative->initial_rotation);
+   output->initial_x -= xf86ModeWidth (modes[o], 
output->initial_rotation);
break;
default:
break;

commit 94a1a611180ba38902b88d2be56a38f31b2eaed5
Author: Matthias Hopf <[EMAIL PROTECTED]>
Date:   Tue Nov 20 16:54:50 2007 +0100

Fix initial placement of LeftOf and Above.
(cherry picked from commit fa19e84714aa84a2f2e817e363d6440349d0b619)

diff --git a/hw/xfree86/modes/xf86Crtc.c b/hw/xfree86/modes/xf86Crtc.c
index d375da8..ad206f1 100644
--- a/hw/xfree86/modes/xf86Crtc.c
+++ b/hw/xfree86/modes/xf86Crtc.c
@@ -1068,10 +1068,10 @@ xf86InitialOutputPositions (ScrnInfoPtr scrn, 
DisplayModePtr *modes)
output->initial_x += xf86ModeWidth (modes[or], 
relative->initial_rotation);
break;
case OPTION_ABOVE:
-   output->initial_y -= xf86ModeHeight (modes[or], 
relative->initial_rotation);
+   output->initial_y -= xf86ModeHeight (modes[o], 
relative->initial_rotation);
break;
case OPTION_LEFT_OF:
-   output->initial_x -= xf86ModeWidth (modes[or], 
relative->initial_rotation);
+   output->initial_x -= xf86ModeWidth (modes[o], 
relative->initial_rotation);
break;
default:
break;

commit 80e3bd7b9b1a8fa7073ec8bef0b2e8c8671710a5
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Wed Jun 11 18:58:36 2008 +0200

Update changelogs and drop patch included upstream

diff --git a/ChangeLog b/ChangeLog
index ba131de..f25053b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,107 @@
+commit c3a7903f6a6a27e53ba0372408e0c5a68c608e86
+Author: Julien Cristau <[EMAIL PROTECTED]>
+Date:   Wed Jun 11 16:27:10 2008 +0200
+
+Bump to 1.4.2
+
+And update release date.
+
+commit 08e6292e7efff518730e3c54f3a082c6139d618d
+Author: Matthieu Herrb <[EMAIL PROTECTED]>
+Date:   Sun Jun 8 11:16:23 2008 -0600
+
+CVE-2008-1379 - MIT-SHM arbitrary memory read
+
+An integer overflow in the validation of the parameters of the
+ShmPutImage() request makes it possible to trigger the copy of
+arbitrary server memory to a pixmap that can subsequently 

Bug#485775: dependence between compiz-foo and libdecoration

2008-06-11 Thread sean finney
On Wednesday 11 June 2008 02:15:28 pm Julien Cristau wrote:
> libdecoration0.shlibs still says 'libdecoration0 (>= 0.5.0)', which
> seems wrong.  I guess that should be bumped to 0.7.6. Sean?

yeah, i think so.  you think this should trigger an immediate upload and reset 
the sid->lenny transition?

sean


signature.asc
Description: This is a digitally signed message part.


xorg-server: Changes to 'ubuntu'

2008-06-11 Thread Bryce Harrington
 debian/changelog   |   11 ++
 debian/patches/170_xorg-xserver-1.4-cve-2008-1377.diff |   88 +
 debian/patches/171_xorg-xserver-1.4-cve-2008-1379.diff |   24 
 debian/patches/172_xorg-xserver-1.4-cve-2008-2360.diff |   32 ++
 debian/patches/173_xorg-xserver-1.4-cve-2008-2361.diff |   13 ++
 debian/patches/174_xorg-xserver-1.4-cve-2008-2362.diff |   63 
 debian/patches/series  |5 
 7 files changed, 236 insertions(+)

New commits:
commit 56e7f0a416b4bd2c16e5db7997a716fa495dd64a
Author: Bryce Harrington <[EMAIL PROTECTED]>
Date:   Wed Jun 11 10:54:56 2008 -0700

Security fixes

diff --git a/debian/changelog b/debian/changelog
index 2b44c46..66c8b20 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+xorg-server (2:1.4.1~git20080131-1ubuntu12) intrepid; urgency=low
+
+   * Fix multiple security issues:
+ + CVE-2008-2360 - RENDER Extension heap buffer overflow
+ + CVE-2008-2361 - RENDER Extension crash
+ + CVE-2008-2362 - RENDER Extension memory corruption
+ + CVE-2008-1379 - MIT-SHM arbitrary memory read
+ + CVE-2008-1377 - RECORD and Security extensions memory corruption
+
+ -- Bryce Harrington <[EMAIL PROTECTED]>  Wed, 11 Jun 2008 10:54:15 -0700
+
 xorg-server (2:1.4.1~git20080131-1ubuntu11) intrepid; urgency=low
 
   * 169_xf86AutoConfig_choose_default_driver_if_no_pci.patch
diff --git a/debian/patches/170_xorg-xserver-1.4-cve-2008-1377.diff 
b/debian/patches/170_xorg-xserver-1.4-cve-2008-1377.diff
new file mode 100644
index 000..4eb7e1d
--- /dev/null
+++ b/debian/patches/170_xorg-xserver-1.4-cve-2008-1377.diff
@@ -0,0 +1,88 @@
+diff --git a/Xext/security.c b/Xext/security.c
+index ba057de..f34c463 100644
+--- a/Xext/security.c
 b/Xext/security.c
+@@ -651,15 +651,19 @@ SProcSecurityGenerateAuthorization(
+ register char n;
+ CARD32 *values;
+ unsigned long nvalues;
++int values_offset;
+ 
+ swaps(&stuff->length, n);
+ REQUEST_AT_LEAST_SIZE(xSecurityGenerateAuthorizationReq);
+ swaps(&stuff->nbytesAuthProto, n);
+ swaps(&stuff->nbytesAuthData, n);
+ swapl(&stuff->valueMask, n);
+-values = (CARD32 *)(&stuff[1]) +
+-  ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
+-  ((stuff->nbytesAuthData + (unsigned)3) >> 2);
++values_offset = ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
++  ((stuff->nbytesAuthData + (unsigned)3) >> 2);
++if (values_offset > 
++  stuff->length - (sz_xSecurityGenerateAuthorizationReq >> 2))
++  return BadLength;
++values = (CARD32 *)(&stuff[1]) + values_offset;
+ nvalues = (((CARD32 *)stuff) + stuff->length) - values;
+ SwapLongs(values, nvalues);
+ return ProcSecurityGenerateAuthorization(client);
+diff --git a/record/record.c b/record/record.c
+index 0ed8f84..9a166d6 100644
+--- a/record/record.c
 b/record/record.c
+@@ -2656,7 +2656,7 @@ SProcRecordQueryVersion(ClientPtr client)
+ } /* SProcRecordQueryVersion */
+ 
+ 
+-static void
++static int
+ SwapCreateRegister(xRecordRegisterClientsReq *stuff)
+ {
+ register char n;
+@@ -2667,11 +2667,17 @@ SwapCreateRegister(xRecordRegisterClientsReq *stuff)
+ swapl(&stuff->nClients, n);
+ swapl(&stuff->nRanges, n);
+ pClientID = (XID *)&stuff[1];
++if (stuff->nClients > stuff->length - (sz_xRecordRegisterClientsReq >> 2))
++  return BadLength;
+ for (i = 0; i < stuff->nClients; i++, pClientID++)
+ {
+   swapl(pClientID, n);
+ }
++if (stuff->nRanges > stuff->length - (sz_xRecordRegisterClientsReq >> 2)
++  - stuff->nClients)
++  return BadLength;
+ RecordSwapRanges((xRecordRange *)pClientID, stuff->nRanges);
++return Success;
+ } /* SwapCreateRegister */
+ 
+ 
+@@ -2679,11 +2685,13 @@ static int
+ SProcRecordCreateContext(ClientPtr client)
+ {
+ REQUEST(xRecordCreateContextReq);
++int   status;
+ register char n;
+ 
+ swaps(&stuff->length, n);
+ REQUEST_AT_LEAST_SIZE(xRecordCreateContextReq);
+-SwapCreateRegister((pointer)stuff);
++if ((status = SwapCreateRegister((pointer)stuff)) != Success)
++  return status;
+ return ProcRecordCreateContext(client);
+ } /* SProcRecordCreateContext */
+ 
+@@ -2692,11 +2700,13 @@ static int
+ SProcRecordRegisterClients(ClientPtr client)
+ {
+ REQUEST(xRecordRegisterClientsReq);
++int   status;
+ register char n;
+ 
+ swaps(&stuff->length, n);
+ REQUEST_AT_LEAST_SIZE(xRecordRegisterClientsReq);
+-SwapCreateRegister((pointer)stuff);
++if ((status = SwapCreateRegister((pointer)stuff)) != Success)
++  return status;
+ return ProcRecordRegisterClients(client);
+ } /* SProcRecordRegisterClients */
+ 
diff --git a/debian/patches/171_xorg-xserver-1.4-cve-2008-1379.diff 
b/debian/patches/171_xorg-xserver-1.4-cve-2008-1379.diff
new file mode 100644
index 000..180d126
--- /dev/null
+

Bug#485860: xserver-xorg-core: iDefense Security Advisory 06.11.08

2008-06-11 Thread Paul Szabo
Package: xserver-xorg-core
Version: 2:1.1.1-21etch4
Severity: grave
Tags: security
Justification: user security hole

iDefense has reported Xorg security issues:

iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
AllocateGlyph() Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062770.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
ProcRenderCreateCursor() Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062771.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
Gradient Creation Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062772.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Record and 
Security Extensions Multiple Memory Corruption Vulnerabilities
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062773.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server MIT-SHM Extension 
Information Disclosure Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062774.html

They all refer to:

X.Org security advisory june 2008 - Multiple vulnerabilities in X server 
extensions
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html

I wonder if Debian is affected by these issues.

Thanks,

Paul Szabo   [EMAIL PROTECTED]   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of SydneyAustralia


-- Package-specific info:
[Snipped: checks, listings of xorg.conf and Xorg.0.log]

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-pk02.15-svr
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages xserver-xorg-core depends on:
ii  libc6  2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii  libfontenc11:1.0.2-2 X11 font encoding library
ii  libgcc11:4.1.1-21GCC support library
ii  libxau61:1.0.1-2 X11 authorisation library
ii  libxdmcp6  1:1.0.1-2 X11 Display Manager Control Protoc
ii  libxfont1  1:1.2.2-2.etch1   X11 font rasterisation library
ii  x11-common 1:7.1.0-19X Window System (X.Org) infrastruc
ii  xserver-xorg   1:7.1.0-19the X.Org X server
ii  zlib1g 1:1.2.3-13compression library - runtime

Versions of packages xserver-xorg-core recommends:
ii  xfonts-base   1:1.0.0-4  standard fonts for X
ii  xkb-data  0.9-4  X Keyboard Extension (XKB) configu

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485865: [INTL:ar] Arabic debconf translation update for xorg

2008-06-11 Thread Ossama Khayat
Package: xorg
Version: 1:7.1.0-19
Severity: wishlist

tags l10n, patch

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages xorg depends on:
ii  gnome-terminal [x-terminal- 2.14.2-1 The GNOME 2 terminal emulator appl
ii  libgl1-mesa-dri 6.5.1-0.6A free implementation of the OpenG
ii  libgl1-mesa-glx 6.5.1-0.6A free implementation of the OpenG
ii  libglu1-mesa6.5.1-0.6The OpenGL utility library (GLU)
ii  type-handling [not+sparc]   0.2.19   dpkg architecture generation scrip
ii  xbase-clients   1:7.1.ds1-2  miscellaneous X clients
ii  xfonts-100dpi   1:1.0.0-3100 dpi fonts for X
ii  xfonts-75dpi1:1.0.0-375 dpi fonts for X
ii  xfonts-base 1:1.0.0-4standard fonts for X
ii  xfonts-scalable 1:1.0.0-6scalable fonts for X
ii  xkb-data0.9-4X Keyboard Extension (XKB) configu
ii  xserver-xorg1:7.1.0-19   the X.Org X server
ii  xterm [x-terminal-emulator] 222-1etch2   X terminal emulator
ii  xutils  1:7.1.ds.3-1 X Window System utility programs

xorg recommends no packages.

-- no debconf information
# translation of ar.po to Arabic
# xserver-xorg translation
# Copyright (C) 2006 The Arabeyes Project
# This file is distributed under the same license as the xserver-xorg package.
#
# Ossama M. Khayat <[EMAIL PROTECTED]>, 2006, 2007, 2008.
msgid ""
msgstr ""
"Project-Id-Version: ar\n"
"Report-Msgid-Bugs-To: [EMAIL PROTECTED]"
"POT-Creation-Date: 2008-06-08 22:20+0200\n"
"PO-Revision-Date: 2008-06-12 03:41+0300\n"
"Last-Translator: Ossama M. Khayat <[EMAIL PROTECTED]>\n"
"Language-Team: Arabic <[EMAIL PROTECTED]>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.11.4\n"
"Plural-Forms: nplurals=4; plural=n%100==1 || n==0 ? 0 : n%100==2 ? 2 : 
n%100>=3 && n%100<=10 ? 2 : 3;\n"

#. Type: select
#. Description
#: ../xserver-xorg.templates:2001
msgid "X server driver:"
msgstr "مُشغّل خادم X:"

#. Type: select
#. Description
#: ../xserver-xorg.templates:2001
msgid ""
"For the X Window System graphical user interface to operate correctly, it is "
"necessary to select a video card driver for the X server."
msgstr ""
"كي تعمل واجهة المستخدم الرسومية لنظام نوافذ X بشكل صحيح، فإنه من الضروري "
"اختيار مُشغّل بطاقة فيديو لخادم X."

#. Type: select
#. Description
#: ../xserver-xorg.templates:2001
msgid ""
"Drivers are typically named for the video card or chipset manufacturer, or "
"for a specific model or family of chipsets."
msgstr ""
"تسمى المشغّلات عادة باسم بطاقة الفيديو أو مصنّع الرقاقة، أو لطراز معيّن أو "
"عائلة من الرقاقات."

#. Type: boolean
#. Description
#: ../xserver-xorg.templates:3001
msgid "Use kernel framebuffer device interface?"
msgstr "استخدام واجهة جهاز framebuffer الخاصة بالنواة؟"

#. Type: boolean
#. Description
#: ../xserver-xorg.templates:3001
msgid ""
"Rather than communicating directly with the video hardware, the X server may "
"be configured to perform some operations, such as video mode switching, via "
"the kernel's framebuffer driver."
msgstr ""
"بدلاً من التواصل مباشرة مع عتاد الفيديو، يمكن تهيئة خادم X لتأدية بعض "
"الأعمال، كتبديل وضع الفيديو عبر مُشغل kernel framebuffer."

#. Type: boolean
#. Description
#: ../xserver-xorg.templates:3001
msgid ""
"In theory, either approach should work, but in practice, sometimes one does "
"and the other does not.  Enabling this option is the safe bet, but feel free "
"to turn it off if it appears to cause problems."
msgstr ""
"نظرياً، يجب أن تصلح أي من الطريقتين، ولكن عملياً، قد تصلح طريقة ولا تصلح "
"الأخرى.  تمكين هذا الخيار هو الاختيار الأفضل، ولكن لا تتردد بتعطيله إن كان "
"يبدو أن يسبب أية مشاكل."

#. Type: string
#. Description
#: ../xserver-xorg.templates:4001
msgid "Video card's bus identifier:"
msgstr "مُعرّف ناقل بطاقة الفيديو:"

#. Type: string
#. Description
#: ../xserver-xorg.templates:4001
msgid ""
"Users of PowerPC machines, and users of any computer with multiple video "
"devices, should specify the BusID of the video card in an accepted bus-"
"specific format."
msgstr ""
"يجب على مستخدمي PowerPC، أو مستخدمي أية حاسب يحتوي عدة أجهزة فيديو، تحديد "
"قيمة BusID لبطاقة الفيديو بنسق معيّن مقبول."

#. Type: string
#. Description
#: ../xserver-xorg.templates:4001
msgid "Examples:"
msgstr "أمثلة:"

#. Type: string
#. Description
#: ../xserver-xorg.templates:4001
msgid ""
"For users of multi-head setups, this option will configure only one of the "
"heads.  Further configuration will have to be done manually in the X server "
"configuration file, /etc/X11/xorg.conf."
msgstr ""
"لمستخدمي إعدادات الرؤوس المتعددة، سيقوم هذا الخيار بتهيئة واحد من الرؤوس "
"فقط.  ويجب

Processed: fixed 485860 in 2:1.4.1~git20080517-2

2008-06-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.29
> fixed 485860 2:1.4.1~git20080517-2
Bug#485860: xserver-xorg-core: iDefense Security Advisory 06.11.08
Bug marked as fixed in version 2:1.4.1~git20080517-2.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processing of xorg-server_1.1.1-21etch5_i386.changes

2008-06-11 Thread Archive Administrator
xorg-server_1.1.1-21etch5_i386.changes uploaded successfully to localhost
along with the files:
  xorg-server_1.1.1-21etch5.dsc
  xorg-server_1.1.1-21etch5.diff.gz
  xserver-xorg-core_1.1.1-21etch5_i386.deb
  xserver-xorg-dev_1.1.1-21etch5_i386.deb
  xdmx_1.1.1-21etch5_i386.deb
  xdmx-tools_1.1.1-21etch5_i386.deb
  xnest_1.1.1-21etch5_i386.deb
  xvfb_1.1.1-21etch5_i386.deb
  xserver-xephyr_1.1.1-21etch5_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485860: marked as done (xserver-xorg-core: iDefense Security Advisory 06.11.08)

2008-06-11 Thread Debian Bug Tracking System

Your message dated Thu, 12 Jun 2008 00:12:04 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#485860: xserver-xorg-core: iDefense Security Advisory 
06.11.08
has caused the Debian Bug report #485860,
regarding xserver-xorg-core: iDefense Security Advisory 06.11.08
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
485860: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485860
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: xserver-xorg-core
Version: 2:1.1.1-21etch4
Severity: grave
Tags: security
Justification: user security hole

iDefense has reported Xorg security issues:

iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
AllocateGlyph() Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062770.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
ProcRenderCreateCursor() Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062771.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Render Extension 
Gradient Creation Integer Overflow Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062772.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server Record and 
Security Extensions Multiple Memory Corruption Vulnerabilities
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062773.html
iDefense Security Advisory 06.11.08: Multiple Vendor X Server MIT-SHM Extension 
Information Disclosure Vulnerability
http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062774.html

They all refer to:

X.Org security advisory june 2008 - Multiple vulnerabilities in X server 
extensions
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html

I wonder if Debian is affected by these issues.

Thanks,

Paul Szabo   [EMAIL PROTECTED]   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of SydneyAustralia


-- Package-specific info:
[Snipped: checks, listings of xorg.conf and Xorg.0.log]

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-pk02.15-svr
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages xserver-xorg-core depends on:
ii  libc6  2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii  libfontenc11:1.0.2-2 X11 font encoding library
ii  libgcc11:4.1.1-21GCC support library
ii  libxau61:1.0.1-2 X11 authorisation library
ii  libxdmcp6  1:1.0.1-2 X11 Display Manager Control Protoc
ii  libxfont1  1:1.2.2-2.etch1   X11 font rasterisation library
ii  x11-common 1:7.1.0-19X Window System (X.Org) infrastruc
ii  xserver-xorg   1:7.1.0-19the X.Org X server
ii  zlib1g 1:1.2.3-13compression library - runtime

Versions of packages xserver-xorg-core recommends:
ii  xfonts-base   1:1.0.0-4  standard fonts for X
ii  xkb-data  0.9-4  X Keyboard Extension (XKB) configu

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2:1.1.1-21etch5

Thanks, we are well aware and updated packages have been released for both sid 
and etch.


cheers,
Thijs

--- End Message ---


xserver-xorg-input-summa 1:1.2.0-1 MIGRATED to testing

2008-06-11 Thread Debian testing watch
FYI: The status of the xserver-xorg-input-summa source package
in Debian's testing distribution has changed.

  Previous version: 1:1.1.0-4
  Current version:  1:1.2.0-1

-- 
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xserver-xorg-input-palmax 1:1.2.0-1 MIGRATED to testing

2008-06-11 Thread Debian testing watch
FYI: The status of the xserver-xorg-input-palmax source package
in Debian's testing distribution has changed.

  Previous version: 1:1.1.0-3
  Current version:  1:1.2.0-1

-- 
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xserver-xorg-input-penmount 1:1.3.0-1 MIGRATED to testing

2008-06-11 Thread Debian testing watch
FYI: The status of the xserver-xorg-input-penmount source package
in Debian's testing distribution has changed.

  Previous version: 1:1.2.1-2
  Current version:  1:1.3.0-1

-- 
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xorg-server: Changes to 'debian-unstable'

2008-06-11 Thread Julien Cristau
 configure |   22 +++---
 1 file changed, 11 insertions(+), 11 deletions(-)

New commits:
commit 511101c7b009338e7a08ac64c36ad5a6622a87b4
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu Jun 12 02:55:10 2008 +0200

autoreconf

diff --git a/configure b/configure
index 6789fd6..be84f57 100755
--- a/configure
+++ b/configure
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.61 for xorg-server 1.4.0.90.
+# Generated by GNU Autoconf 2.61 for xorg-server 1.4.2.
 #
 # Report bugs to .
 #
@@ -728,8 +728,8 @@ SHELL=${CONFIG_SHELL-/bin/sh}
 # Identity of this package.
 PACKAGE_NAME='xorg-server'
 PACKAGE_TARNAME='xorg-server'
-PACKAGE_VERSION='1.4.0.90'
-PACKAGE_STRING='xorg-server 1.4.0.90'
+PACKAGE_VERSION='1.4.2'
+PACKAGE_STRING='xorg-server 1.4.2'
 PACKAGE_BUGREPORT='https://bugs.freedesktop.org/enter_bug.cgi?product=xorg'
 
 ac_unique_file="Makefile.am"
@@ -1877,7 +1877,7 @@ if test "$ac_init_help" = "long"; then
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat <<_ACEOF
-\`configure' configures xorg-server 1.4.0.90 to adapt to many kinds of systems.
+\`configure' configures xorg-server 1.4.2 to adapt to many kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1947,7 +1947,7 @@ fi
 
 if test -n "$ac_init_help"; then
   case $ac_init_help in
- short | recursive ) echo "Configuration of xorg-server 1.4.0.90:";;
+ short | recursive ) echo "Configuration of xorg-server 1.4.2:";;
esac
   cat <<\_ACEOF
 
@@ -2296,7 +2296,7 @@ fi
 test -n "$ac_init_help" && exit $ac_status
 if $ac_init_version; then
   cat <<\_ACEOF
-xorg-server configure 1.4.0.90
+xorg-server configure 1.4.2
 generated by GNU Autoconf 2.61
 
 Copyright (C) 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001,
@@ -2310,7 +2310,7 @@ cat >config.log <<_ACEOF
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by xorg-server $as_me 1.4.0.90, which was
+It was created by xorg-server $as_me 1.4.2, which was
 generated by GNU Autoconf 2.61.  Invocation command line was
 
   $ $0 $@
@@ -3001,7 +3001,7 @@ fi
 
 # Define the identity of the package.
  PACKAGE='xorg-server'
- VERSION='1.4.0.90'
+ VERSION='1.4.2'
 
 
 cat >>confdefs.h <<_ACEOF
@@ -26977,7 +26977,7 @@ VENDOR_MAN_VERSION="Version ${PACKAGE_VERSION}"
 
 VENDOR_NAME="The X.Org Foundation"
 VENDOR_NAME_SHORT="X.Org"
-RELEASE_DATE="5 September 2007"
+RELEASE_DATE="11 June 2008"
 VENDOR_WEB="http://wiki.x.org";
 
 
@@ -38665,7 +38665,7 @@ exec 6>&1
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log="
-This file was extended by xorg-server $as_me 1.4.0.90, which was
+This file was extended by xorg-server $as_me 1.4.2, which was
 generated by GNU Autoconf 2.61.  Invocation command line was
 
   CONFIG_FILES= $CONFIG_FILES
@@ -38718,7 +38718,7 @@ Report bugs to <[EMAIL PROTECTED]>."
 _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF
 ac_cs_version="\\
-xorg-server config.status 1.4.0.90
+xorg-server config.status 1.4.2
 configured by $0, generated by GNU Autoconf 2.61,
   with options \\"`echo "$ac_configure_args" | sed 's/^ //; 
s/[\\""\`\$]/&/g'`\\"
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: remembering brightness/contrast

2008-06-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> #BG> First, make sure you're running xserver-xorg-video-intel 2.3.1.
> found 485465 2:2.3.1-1
Bug#485465: remember brightness level
Bug marked as found in version 2:2.3.1-1.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485465: remembering brightness/contrast

2008-06-11 Thread jidanni
#BG> First, make sure you're running xserver-xorg-video-intel 2.3.1.
found 485465 2:2.3.1-1
thanks
BG> And please try latest upstream git.
I get in trouble if I stray from apt-get. Not an advanced user.
BG> But in the end, you probably need a way to configure the brightness
BG> through randr 1.2 properties in xorg.conf, but I don't think there's
BG> anyway to do that yet (and that would be a xserver-xorg-core wishlist).
OK, do reassign this bug as needed.

(Also nothing in /sys or /proc to change the contrast/brightness. E.g. on a
Monitor name: Rad-5Q
today, the only way to change anything is to lean over and press its
buttons. At least it stays put on the Rad-5Q, session to session.)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xorg-server: Changes to 'debian-etch'

2008-06-11 Thread Julien Cristau
 debian/changelog  |   11 +
 debian/patches/idef-apr08-v3-xserver-1.4.diff |  202 ++
 debian/patches/series |1 
 3 files changed, 214 insertions(+)

New commits:
commit 52da140f88dc6075b93d979d229cdbed9d72ca59
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu May 29 12:25:46 2008 +0200

Prepare changelog for upload

diff --git a/debian/changelog b/debian/changelog
index 8ab5688..921867c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
-xorg-server (2:1.1.1-21etch5) UNRELEASED; urgency=high
+xorg-server (2:1.1.1-21etch5) stable-security; urgency=high
 
   * Security update, fixes several vulnerabilities.  References:
 CVE-2008-2360 - RENDER Extension heap buffer overflow
@@ -7,7 +7,7 @@ xorg-server (2:1.1.1-21etch5) UNRELEASED; urgency=high
 CVE-2008-1379 - MIT-SHM arbitrary memory read
 CVE-2008-1377 - RECORD and Security extensions memory corruption
 
- -- Julien Cristau <[EMAIL PROTECTED]>  Wed, 07 May 2008 14:46:10 +0200
+ -- Julien Cristau <[EMAIL PROTECTED]>  Thu, 29 May 2008 12:25:37 +0200
 
 xorg-server (2:1.1.1-21etch4) stable; urgency=low
 

commit c6e842267b1703da02857b1ba765fb82e2a3e707
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu May 29 12:24:45 2008 +0200

Security update, fixes several vulnerabilities.

References:
CVE-2008-2360 - RENDER Extension heap buffer overflow
CVE-2008-2361 - RENDER Extension crash
CVE-2008-2362 - RENDER Extension memory corruption
CVE-2008-1379 - MIT-SHM arbitrary memory read
CVE-2008-1377 - RECORD and Security extensions memory corruption

diff --git a/debian/changelog b/debian/changelog
index 32a4aa6..8ab5688 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+xorg-server (2:1.1.1-21etch5) UNRELEASED; urgency=high
+
+  * Security update, fixes several vulnerabilities.  References:
+CVE-2008-2360 - RENDER Extension heap buffer overflow
+CVE-2008-2361 - RENDER Extension crash
+CVE-2008-2362 - RENDER Extension memory corruption
+CVE-2008-1379 - MIT-SHM arbitrary memory read
+CVE-2008-1377 - RECORD and Security extensions memory corruption
+
+ -- Julien Cristau <[EMAIL PROTECTED]>  Wed, 07 May 2008 14:46:10 +0200
+
 xorg-server (2:1.1.1-21etch4) stable; urgency=low
 
   [ Julien Cristau ]
diff --git a/debian/patches/idef-apr08-v3-xserver-1.4.diff 
b/debian/patches/idef-apr08-v3-xserver-1.4.diff
new file mode 100644
index 000..07ced6e
--- /dev/null
+++ b/debian/patches/idef-apr08-v3-xserver-1.4.diff
@@ -0,0 +1,202 @@
+--- xorg-server.orig/Xext/security.c
 xorg-server/Xext/security.c
+@@ -652,15 +652,19 @@
+ register char n;
+ CARD32 *values;
+ unsigned long nvalues;
++int values_offset;
+ 
+ swaps(&stuff->length, n);
+ REQUEST_AT_LEAST_SIZE(xSecurityGenerateAuthorizationReq);
+ swaps(&stuff->nbytesAuthProto, n);
+ swaps(&stuff->nbytesAuthData, n);
+ swapl(&stuff->valueMask, n);
+-values = (CARD32 *)(&stuff[1]) +
+-  ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
+-  ((stuff->nbytesAuthData + (unsigned)3) >> 2);
++values_offset = ((stuff->nbytesAuthProto + (unsigned)3) >> 2) +
++  ((stuff->nbytesAuthData + (unsigned)3) >> 2);
++if (values_offset > 
++  stuff->length - (sz_xSecurityGenerateAuthorizationReq >> 2))
++  return BadLength;
++values = (CARD32 *)(&stuff[1]) + values_offset;
+ nvalues = (((CARD32 *)stuff) + stuff->length) - values;
+ SwapLongs(values, nvalues);
+ return ProcSecurityGenerateAuthorization(client);
+--- xorg-server.orig/Xext/shm.c
 xorg-server/Xext/shm.c
+@@ -861,8 +861,17 @@
+ return BadValue;
+ }
+ 
+-VERIFY_SHMSIZE(shmdesc, stuff->offset, length * stuff->totalHeight,
+- client);
++/* 
++ * There's a potential integer overflow in this check:
++ * VERIFY_SHMSIZE(shmdesc, stuff->offset, length * stuff->totalHeight,
++ *client);
++ * the version below ought to avoid it
++ */
++if (stuff->totalHeight != 0 && 
++  length > (shmdesc->size - stuff->offset)/stuff->totalHeight) {
++  client->errorValue = stuff->totalWidth;
++  return BadValue;
++}
+ if (stuff->srcX > stuff->totalWidth)
+ {
+   client->errorValue = stuff->srcX;
+--- xorg-server.orig/record/record.c
 xorg-server/record/record.c
+@@ -2659,7 +2659,7 @@
+ } /* SProcRecordQueryVersion */
+ 
+ 
+-static void
++static int
+ SwapCreateRegister(xRecordRegisterClientsReq *stuff)
+ {
+ register char n;
+@@ -2670,11 +2670,17 @@
+ swapl(&stuff->nClients, n);
+ swapl(&stuff->nRanges, n);
+ pClientID = (XID *)&stuff[1];
++if (stuff->nClients > stuff->length - (sz_xRecordRegisterClientsReq >> 2))
++  return BadLength;
+ for (i = 0; i < stuff->nClients; i++, pClientID++)
+ {
+   swapl(pClientID, n);
+ }
++if (stuff->nRanges > stuff->length - (sz_xRe

xorg-server: Changes to 'refs/tags/xorg-server-2_1.1.1-21etch5'

2008-06-11 Thread Julien Cristau
Tag 'xorg-server-2_1.1.1-21etch5' created by Julien Cristau <[EMAIL PROTECTED]> 
at 2008-06-01 23:19 +

Tagging upload of xorg-server 2:1.1.1-21etch5 to stable-security.

Changes since xorg-server-2_1.1.1-21etch4:
Julien Cristau (2):
  Security update, fixes several vulnerabilities.
  Prepare changelog for upload

---
 debian/changelog  |   11 +
 debian/patches/idef-apr08-v3-xserver-1.4.diff |  202 ++
 debian/patches/series |1 
 3 files changed, 214 insertions(+)
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 476876 is important

2008-06-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.29
> severity 476876 important
Bug#476876: xserver-xorg-video-s3: S3 server crash/lockup with S3 Trio 64+
Severity set to `important' from `critical'

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xorg-server: Changes to 'debian-unstable'

2008-06-11 Thread Julien Cristau
 debian/changelog  |3 +++
 debian/patches/48_xaa_nooffscreenpixmaps.diff |   26 ++
 debian/patches/series |1 +
 3 files changed, 30 insertions(+)

New commits:
commit 0fb46ce64b8aac62c4f0d5ae4c1d4550301a86d3
Author: Julien Cristau <[EMAIL PROTECTED]>
Date:   Thu Jun 12 06:04:46 2008 +0200

48_xaa_nooffscreenpixmaps.diff: disable XAA offscreen pixmaps by default

They can be enabled with Option "XaaOffscreenPixmaps"
(closes: #478277, #41).

diff --git a/debian/changelog b/debian/changelog
index c857473..153b6c9 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -4,6 +4,9 @@ xorg-server (2:1.4.2-1) UNRELEASED; urgency=low
   * Security fixes from the previous upload are included upstream.
   * Cherry-pick patches from upstream git to make the LeftOf and Above options
 in xorg.conf actually work (closes: #466526).
+  * 48_xaa_nooffscreenpixmaps.diff: disable XAA offscreen pixmaps by default;
+they can be enabled with Option "XaaOffscreenPixmaps" (closes: #478277,
+#41).
 
  -- Julien Cristau <[EMAIL PROTECTED]>  Wed, 11 Jun 2008 18:57:01 +0200
 
diff --git a/debian/patches/48_xaa_nooffscreenpixmaps.diff 
b/debian/patches/48_xaa_nooffscreenpixmaps.diff
new file mode 100644
index 000..799368b
--- /dev/null
+++ b/debian/patches/48_xaa_nooffscreenpixmaps.diff
@@ -0,0 +1,26 @@
+xaa: disable offscreen pixmaps by default
+
+Can be enabled with Option "XaaOffscreenPixmaps".
+
+Index: xorg-server/hw/xfree86/xaa/xaaInitAccel.c
+===
+--- xorg-server.orig/hw/xfree86/xaa/xaaInitAccel.c 2008-06-12 
05:52:15.0 +0200
 xorg-server/hw/xfree86/xaa/xaaInitAccel.c  2008-06-12 05:57:07.0 
+0200
+@@ -87,7 +87,7 @@
+   OPTV_BOOLEAN,   {0}, FALSE },
+ {XAAOPT_PIXMAP_CACHE, "XaaNoPixmapCache",
+   OPTV_BOOLEAN,   {0}, FALSE },
+-{XAAOPT_OFFSCREEN_PIXMAPS,"XaaNoOffscreenPixmaps",
++{XAAOPT_OFFSCREEN_PIXMAPS,"XaaOffscreenPixmaps",
+   OPTV_BOOLEAN,   {0}, FALSE },
+ { -1, NULL,
+   OPTV_NONE,  {0}, FALSE }
+@@ -542,7 +542,7 @@
+ #define XAAMSG(s) do { if (serverGeneration == 1) xf86ErrorF(s); } while (0)
+ 
+ if((infoRec->Flags & OFFSCREEN_PIXMAPS) && HaveScreenToScreenCopy &&
+-  !xf86IsOptionSet(options, XAAOPT_OFFSCREEN_PIXMAPS)) {
++  xf86IsOptionSet(options, XAAOPT_OFFSCREEN_PIXMAPS)) {
+   XAAMSG("\tOffscreen Pixmaps\n");
+ } else {
+   infoRec->Flags &= ~OFFSCREEN_PIXMAPS;
diff --git a/debian/patches/series b/debian/patches/series
index 9713eb7..b477e51 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -20,6 +20,7 @@
 45_only_XF86_APM_CAPABILITY_CHANGED_for_video_change_acpi_events.diff
 46_reduce_wakeups_from_smart_scheduler.patch
 #47_fbdevhw_magic_numbers.diff
+48_xaa_nooffscreenpixmaps.diff
 91_ttf2pt1
 91_ttf2pt1_updates
 92_xprint-security-holes-fix.patch


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#455786: can't see video with swfdec on xserver-xorg but works on Xephyr

2008-06-11 Thread Julien Cristau
On Wed, Dec 12, 2007 at 21:22:35 +0100, Santiago Garcia Mantinan wrote:

> > It seems to work for me using the latest intel driver (thus using EXA).
> > Andreas Henriksson said he could reproduce this when using XAA, but not
> > using EXA (with the radeon driver), so I'm retitling it accordingly (and
> > tagging wontfix, because nobody seems interested in fixing XAA these
> > days).
> 
> That's ok with me, I have tested this and EXA seems to work ok, so no
> problem with that, I'd like however to sugest that if XAA seems broken for
> current X, maybe EXA should be enabled by default whenever possible.
> 
> Just for other people having this very same problem... to activate EXA you
> need to add Option "AccelMethod" "EXA" to the section on which you descrive
> your graphic card.
> 
Could you try with XAA and the "XaaNoOffscreenPixmaps" option?  That may
work around the bug.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485465: remembering brightness/contrast

2008-06-11 Thread Brice Goglin
[EMAIL PROTECTED] wrote:
> (Also nothing in /sys or /proc to change the contrast/brightness. E.g. on a
> Monitor name: Rad-5Q
> today, the only way to change anything is to lean over and press its
> buttons. At least it stays put on the Rad-5Q, session to session.)
>   


You should have a backlight property in the output of xandr --prop. Then try
xrandr --output LVDS --set BACKLIGHT 
There's also a backlight_control property that may help. See the manpage
of intel for details.

Brice




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#451791: xserver-xorg-video-intel: Fonts and many other items fail to render legibly

2008-06-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> forwarded 451791 https://bugs.freedesktop.org/show_bug.cgi?id=15278
Bug#451791: [965G EXA] Fonts and many other items fail to render legibly
Bug#452268: [965G EXA] all fonts are unreadable
Bug#462921: xserver-xorg-video-intel: exa corruption with 965Q
Forwarded-to-address changed from 
https://bugs.freedesktop.org/show_bug.cgi?id=12865 to 
https://bugs.freedesktop.org/show_bug.cgi?id=15278.

> notfound 451791 2:2.1.1-1
Bug#451791: [965G EXA] Fonts and many other items fail to render legibly
Bug#452268: [965G EXA] all fonts are unreadable
Bug#462921: xserver-xorg-video-intel: exa corruption with 965Q
Bug no longer marked as found in version 2:2.1.1-1.

> forcemerge 451791 482645 483487
Bug#451791: [965G EXA] Fonts and many other items fail to render legibly
Bug#482645: [965GM] rendering problems (missing text/images) with exa composite
Bug#483487: xserver-xorg-video-intel: font rendering problem hit me about two 
weeks ago
Bug#452268: [965G EXA] all fonts are unreadable
Bug#462921: xserver-xorg-video-intel: exa corruption with 965Q
Forcibly Merged 451791 452268 462921 482645 483487.

> thank you
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#452268: Bug#451791: xserver-xorg-video-intel: Fonts and many other items fail to render legibly

2008-06-11 Thread Brice Goglin
forwarded 451791 https://bugs.freedesktop.org/show_bug.cgi?id=15278
notfound 451791 2:2.1.1-1
forcemerge 451791 482645 483487
thank you



Matthieu CASTET wrote:
> Brice Goglin wrote:
>> Hello people having display corruption on i965,
>>
>> Could you try adding
>>   Option "EXANoComposite" "true"
>> to the Device section of /etc/X11/xorg.conf?
>>
>> (and if not already done, you can try Option "AccelMethod" "XAA" as
>> well)
>>
>> EXA Composite seems to be a good candidate for this kind of breakage.
>>
> That's what I did and it solve the problem.

Good to know, thanks.
I am merging all these similar bugs now, there's a good chance they are
all related to EXA Composite.

> But with new version (last from debian sid) EXA work again.

That's a bit surprising.

Brice




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]