xorg-server_21.1.7-3+deb12u1_source.changes ACCEPTED into proposed-updates
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 23 Oct 2023 19:26:14 +0200 Source: xorg-server Architecture: source Version: 2:21.1.7-3+deb12u1 Distribution: bookworm-security Urgency: medium Maintainer: Debian X Strike Force Changed-By: Julien Cristau Changes: xorg-server (2:21.1.7-3+deb12u1) bookworm-security; urgency=medium . * present-Check-for-NULL-to-prevent-crash.patch: drop, applied upstream since 21.1.4 * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367) * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380) * mi: fix CloseScreen initialization order * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574) Checksums-Sha1: 4cb06a3a3096d3cef6342dc7cb0e21adfab77ca6 4268 xorg-server_21.1.7-3+deb12u1.dsc 64a134919cf467cc404ce45871376cd6abb6cc8c 8922821 xorg-server_21.1.7.orig.tar.gz 2c653f19796de73f9cbaf466658803d47070ced8 195 xorg-server_21.1.7.orig.tar.gz.asc 0a91f6c00f42d75819517769099446c352526297 172506 xorg-server_21.1.7-3+deb12u1.diff.gz Checksums-Sha256: cd08a0cbcdd4c1c5c6e70232e41932fe592b9b1e67623f6847b2abaf7511d5c1 4268 xorg-server_21.1.7-3+deb12u1.dsc 1a9005f47c7ea83645a977581324439628a32c4426303e5a4b9c2d6615becfbf 8922821 xorg-server_21.1.7.orig.tar.gz 2f2113fe0866694084e952c7699a689d1fa0feefd1cc8492d79db432604246c4 195 xorg-server_21.1.7.orig.tar.gz.asc db58a08964dff7fb2e80d78e7944df89a2a5fbee58be439885c5b58322e2cf86 172506 xorg-server_21.1.7-3+deb12u1.diff.gz Files: f2c2e40a76ad391279d5dbd76d3ddaef 4268 x11 optional xorg-server_21.1.7-3+deb12u1.dsc 9c9b0375cb17ad8b4a79f9dd9efc58d0 8922821 x11 optional xorg-server_21.1.7.orig.tar.gz 3d6b4c2abedbcbd6cd7f071d74c56e5d 195 x11 optional xorg-server_21.1.7.orig.tar.gz.asc 663abefebaf9680213783f3d4e36d8ff 172506 x11 optional xorg-server_21.1.7-3+deb12u1.diff.gz -BEGIN PGP SIGNATURE- iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU2rZoUHGpjcmlzdGF1 QGRlYmlhbi5vcmcACgkQnbAjVVb4z618yw//RggZz9fF5/h+3RP8bGqmRqHj7Tnm cHewulbzWJRA/2gqmsJjQZPi0qos6UOfzZOjz/XEFKP51/r8ziAhRL7A+j3aWg2H MFamh9tzQ20nhi3DwHIeKJEs02x9EuR7TJNPUuY9W0e86CL4P/iPUSi3nkfy3By9 2nKPUD7LbwRZXsIVRPjPFaAzdLqGMBMFJ2h3YqoUVrdpfz0b/cGkERhjHgY79ngx ce3EA1Dpi+M7IVvUgYrXwOmNu5CPj6marVPYaghIRbuyo4uXXer32ERjUsTeCjPv VDWruGB/JdgV1SyRgHDKDwC8RTlEb4P1xZdqiJ2wAXJE9d/cRrZpe6d5UT4KSjV8 F1/EH83/gobNyH18AcDg9iXANEuq2e513HhtbkS73zU/T2xRhWknUZKIlCfDdMGi BNVgv4T12Ej8GiH4QfgoFqMS0Cavb0B5+9Le8rTOekxGvG7ReKzRKZc8f6wqIcSL 9V4EyCJov9bixK1h8s1Rky955/XJnRv0Lxj8ER0wHwhnQ3UndAesvGBtS/YFiUWf r3mQrggFsp1kb37yCBCr+b20K5vM0STQP1JMzrWVu9iNVs8u7l32aT71jZulqZ44 yqz8TVu1C6qgB0g2jwBJI93SY6nbOmTqaMEeAHtr4pfG9DbiDC6LyZffHKFB+zvK rB8LyG/TT2U12s8= =WD8j -END PGP SIGNATURE-
xorg-server_21.1.7-3+deb12u2_source.changes ACCEPTED into proposed-updates
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 25 Oct 2023 09:35:47 +0200 Source: xorg-server Architecture: source Version: 2:21.1.7-3+deb12u2 Distribution: bookworm-security Urgency: high Maintainer: Debian X Strike Force Changed-By: Julien Cristau Changes: xorg-server (2:21.1.7-3+deb12u2) bookworm-security; urgency=high . * 0003-mi-fix-CloseScreen-initialization-order.patch, 0004-fb-properly-wrap-unwrap-CloseScreen.patch: drop, causes other bugs that are worse than CVE-2023-5574. . xorg-server (2:21.1.7-3+deb12u1) bookworm-security; urgency=medium . * present-Check-for-NULL-to-prevent-crash.patch: drop, applied upstream since 21.1.4 * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367) * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380) * mi: fix CloseScreen initialization order * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574) Checksums-Sha1: 98095f189c41cfe50547a1b2c1b33ab1996d0a01 4268 xorg-server_21.1.7-3+deb12u2.dsc d966b6c6da6ecef346b04062469a87aa0729685b 170506 xorg-server_21.1.7-3+deb12u2.diff.gz Checksums-Sha256: a4f03753eeb4c2381ecea6aea584d5e0bc1453d26c05e6dd6cd19af9323d8156 4268 xorg-server_21.1.7-3+deb12u2.dsc 7288e7a9aa1558830c3babbbf0acd51c87aca9848a9c5e5f65461d9ed0001829 170506 xorg-server_21.1.7-3+deb12u2.diff.gz Files: 9b32d7a7b4357c038298d403e6316d15 4268 x11 optional xorg-server_21.1.7-3+deb12u2.dsc f5cece7ee06d9c61d02e32934bf29972 170506 x11 optional xorg-server_21.1.7-3+deb12u2.diff.gz -BEGIN PGP SIGNATURE- iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU4xqMUHGpjcmlzdGF1 QGRlYmlhbi5vcmcACgkQnbAjVVb4z621/g//d9XOd/M4gegoWL3ajHVuodDQXnis u6jXdJXOK2C7D/KfN6njrhUZ5Z4YxU/rFMKdbtfM5ri8OKw5FUmKAjecLH/WlVNa lU7bOxvKtWr5d+jLGv0vEpf/HIFyn7+DM6wXmB2vKLriwBS/qNqFi+67BMC/rYMu VtyIO84drmRLrLIU/7hfkksT4uhx8/S67RLpcKZONRm8cDqdarVLSQ13ezkcthhl +u7UO/KrOa1GfVIc/AyqG1iD2wBzl+Yl1BODgu6aq5TlSdFZfXLKtLXpgS5cZNIz kb4dR3B5WIMfJwYsPYVPs6cC0gSIuF6hKkeHHn4bphDkKF/jm2HStcaSQvToQTYD IkDzyKczcz3BolkGPUE2nlkoPk9hq9Z6Nnph64c5yixNRRvKD+Qs7HivSXGFwbad +WNsukg/gagZE4wJCNaC/3wg2+2ANVcrInXSOUBYeePOTSKZwGAaSf/PoGO31yZt VEjhgKgeZ12UIqXE/0OPYMZfKEqv3cvaxYncf+YX+AhE0T6rsp99sX7ljEAEfhUD RKl09CDcMYlne8u71X1wjN7CpTTEloY5MBl2YdM5BmZEilUJr3W9vtHzT537mX+w kyiYUTShwsgGifP1CzIOg7W+ahZkCgPdgXzIao6GS/hxCCmV74Dv4bfto/7ChCZE Ae4b+Xli8pMsdsA= =Igp4 -END PGP SIGNATURE-
xorg-server_1.20.11-1+deb11u7_source.changes ACCEPTED into oldstable-proposed-updates
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 23 Oct 2023 19:26:14 +0200 Source: xorg-server Architecture: source Version: 2:1.20.11-1+deb11u7 Distribution: bullseye-security Urgency: high Maintainer: Debian X Strike Force Changed-By: Julien Cristau Changes: xorg-server (2:1.20.11-1+deb11u7) bullseye-security; urgency=high . * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367) * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380) * mi: fix CloseScreen initialization order * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574) Checksums-Sha1: 86311b316f0efd410cd9f4d91a514fafdd4c874b 4265 xorg-server_1.20.11-1+deb11u7.dsc 66804c44108d5abbe3e3ecc526b65946d57b9031 180629 xorg-server_1.20.11-1+deb11u7.diff.gz Checksums-Sha256: 29120fbdcc671751dcdfd3d2f79e8ff9dc4dad663408d0dddb992b86e81fd849 4265 xorg-server_1.20.11-1+deb11u7.dsc 314b0cba569767063a40b3b5581f3f5add74064490ba1edf7d5950dc3b5b714d 180629 xorg-server_1.20.11-1+deb11u7.diff.gz Files: d0b44fc4bd0c9472f5d1ea5b75ffaa3f 4265 x11 optional xorg-server_1.20.11-1+deb11u7.dsc d146188a0e2480ef6831ed6ea50e9422 180629 x11 optional xorg-server_1.20.11-1+deb11u7.diff.gz -BEGIN PGP SIGNATURE- iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU2sZgUHGpjcmlzdGF1 QGRlYmlhbi5vcmcACgkQnbAjVVb4z60fBw/9E6UDHTR9I8BWbNU0y8OSa4fi4hXN mTL4PzYhJBLFN3/bHVrarpaRcZg2bfpCyAywz34nzLOICM6njGb534KUK6NIokol w804I8IrHru0k5C7o4FNCU8c2z9SIqs6IZGDyL7SWS17K/TjMseURyKK5BjGYdgG ntorWIPWv1kH0AwgfM89ys46yve8nAfbJteDDIOKHoMxHFg2+rqFdjGEoq839Gt6 xZWlat/EmluHauO0EJiOoJu+elv14695PntI9PyNTQvkcp4gINR8FNsQlBZ5ByQ+ SXCofY9jy4ZH3CfA/QrcNIFcAi93VWbq+GRIYerrdjsJqkFlbSPREVdffatRpzwh cyF89wBwAM1yFwA3YlfS2F/70KbSmcRQg0tpw3pljfc/a2BmHBJwR4RUSDq6jWXg jz2k14LJX0d79vqI8ZaTbHGr5u4dbAPXDbOR73s0FQ9AM0Cwu4fXqBOATYjDQyhB kHpQpRlIiLUSJ0N9N7wskzP7+Df+Z7oHFUqnS4nbilbAf+++WwVnj566QVsOsduQ LCVSn25BhzTx4OGJ+d8DaGgb3fGnEO/ajfFWbHG0lBHIYdm84C/RxQA8SyTtLWs8 9mQTEhQ61TgcpjGLjvdPpEpWeqJFjFSM0wou/2Cgf+c5RzIm/xk//Rrb82Oq1IJR viX6IBugKsvWanY= =NPFw -END PGP SIGNATURE-
xorg-server_1.20.11-1+deb11u8_source.changes ACCEPTED into oldstable-proposed-updates
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 25 Oct 2023 09:47:13 +0200 Source: xorg-server Architecture: source Version: 2:1.20.11-1+deb11u8 Distribution: bullseye-security Urgency: high Maintainer: Debian X Strike Force Changed-By: Julien Cristau Changes: xorg-server (2:1.20.11-1+deb11u8) bullseye-security; urgency=high . * 0003-mi-fix-CloseScreen-initialization-order.patch, 0004-fb-properly-wrap-unwrap-CloseScreen.patch: drop, causes other bugs that are worse than CVE-2023-5574. . xorg-server (2:1.20.11-1+deb11u7) bullseye-security; urgency=high . * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367) * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380) * mi: fix CloseScreen initialization order * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574) Checksums-Sha1: c42bd0055272565ec2d446b3d1ccc1a67c770421 4265 xorg-server_1.20.11-1+deb11u8.dsc f2e0bdb18c32319acc1e70bb4945051383b2ae98 179070 xorg-server_1.20.11-1+deb11u8.diff.gz Checksums-Sha256: 21d49d32ed327c8157e772c954400568605f2645c7b68e55a690bffd07e410bd 4265 xorg-server_1.20.11-1+deb11u8.dsc 7e8ddb1dffeb361f2ab4e8f1ef6f3169c11ac0db7dd551e6a18a2e1f3da06c93 179070 xorg-server_1.20.11-1+deb11u8.diff.gz Files: 0208a6ad02080f01486bdc533e822f4a 4265 x11 optional xorg-server_1.20.11-1+deb11u8.dsc 312a2f5b47e71392fe1ec967be677d15 179070 x11 optional xorg-server_1.20.11-1+deb11u8.diff.gz -BEGIN PGP SIGNATURE- iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU4yJ8UHGpjcmlzdGF1 QGRlYmlhbi5vcmcACgkQnbAjVVb4z60H3A//UxiXauGJbirIqpfl6BXBbAAOn0hb xJ3QzThvoUYXuuOPPUaZOlW5FIX/bVfXbYTvzD8DQ/SIITtYGt8+kaMUXLhbfN3e mSx5iIJp3RNCtaYN03YiFBRPOhxiuMsigfPCEXFdzYg6vusSZZ5dw1t4qsCfeASk GWJsnSFVHe29RY333pTPiJZTwgUcViNvUXulMgygdP/ioIfj7adyT/ZsjyJrwwn6 bbbDsUQor5pnk5kO9EppFOEe5n54wsMCcuZCNoDycu5D//vA8WlOCJW/oefYjSuX jeL23wY5menIPtdEczvqjxAdWChHXWlspwM30nUFIfpiXLsb1ICzcvQlHCGnljTg yhgspxnpA34MAY+01FmYdY6x4KOPf1r8N6GlvBG1SyHO9ggr6smaAWGmnUuD65Ea 5yaodEnW1JprdIt4IwQoVgkH3AgvND+jl0lCfxaJwxD16Rh3XTshonMZ+czjMYeL upKYUQrEMvDTL53WR1FNJLozHZC4alYLqNrmKveYSm5oHn9Gp+q32msBQqcRqmwW KJAH4t/yxqTEeBkLsrD5utBzh69g/AAjTst4kP62DbPuvqkzodnalWC1m0zulBfE 9Wj+44WkLy6ilFXmfzi+Mx4EJeBsWwO9ap43vVqkZolM7ZCyNPZY6Dmp3DpvOXxk 5Tnfsm+lHV9UxVk= =Mml+ -END PGP SIGNATURE-