xorg-server_21.1.7-3+deb12u1_source.changes ACCEPTED into proposed-updates

2023-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 23 Oct 2023 19:26:14 +0200
Source: xorg-server
Architecture: source
Version: 2:21.1.7-3+deb12u1
Distribution: bookworm-security
Urgency: medium
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Changes:
 xorg-server (2:21.1.7-3+deb12u1) bookworm-security; urgency=medium
 .
   * present-Check-for-NULL-to-prevent-crash.patch: drop, applied upstream 
since 21.1.4
   * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367)
   * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380)
   * mi: fix CloseScreen initialization order
   * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574)
Checksums-Sha1:
 4cb06a3a3096d3cef6342dc7cb0e21adfab77ca6 4268 xorg-server_21.1.7-3+deb12u1.dsc
 64a134919cf467cc404ce45871376cd6abb6cc8c 8922821 xorg-server_21.1.7.orig.tar.gz
 2c653f19796de73f9cbaf466658803d47070ced8 195 xorg-server_21.1.7.orig.tar.gz.asc
 0a91f6c00f42d75819517769099446c352526297 172506 
xorg-server_21.1.7-3+deb12u1.diff.gz
Checksums-Sha256:
 cd08a0cbcdd4c1c5c6e70232e41932fe592b9b1e67623f6847b2abaf7511d5c1 4268 
xorg-server_21.1.7-3+deb12u1.dsc
 1a9005f47c7ea83645a977581324439628a32c4426303e5a4b9c2d6615becfbf 8922821 
xorg-server_21.1.7.orig.tar.gz
 2f2113fe0866694084e952c7699a689d1fa0feefd1cc8492d79db432604246c4 195 
xorg-server_21.1.7.orig.tar.gz.asc
 db58a08964dff7fb2e80d78e7944df89a2a5fbee58be439885c5b58322e2cf86 172506 
xorg-server_21.1.7-3+deb12u1.diff.gz
Files:
 f2c2e40a76ad391279d5dbd76d3ddaef 4268 x11 optional 
xorg-server_21.1.7-3+deb12u1.dsc
 9c9b0375cb17ad8b4a79f9dd9efc58d0 8922821 x11 optional 
xorg-server_21.1.7.orig.tar.gz
 3d6b4c2abedbcbd6cd7f071d74c56e5d 195 x11 optional 
xorg-server_21.1.7.orig.tar.gz.asc
 663abefebaf9680213783f3d4e36d8ff 172506 x11 optional 
xorg-server_21.1.7-3+deb12u1.diff.gz

-BEGIN PGP SIGNATURE-
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=WD8j
-END PGP SIGNATURE-



xorg-server_21.1.7-3+deb12u2_source.changes ACCEPTED into proposed-updates

2023-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 25 Oct 2023 09:35:47 +0200
Source: xorg-server
Architecture: source
Version: 2:21.1.7-3+deb12u2
Distribution: bookworm-security
Urgency: high
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Changes:
 xorg-server (2:21.1.7-3+deb12u2) bookworm-security; urgency=high
 .
   * 0003-mi-fix-CloseScreen-initialization-order.patch,
 0004-fb-properly-wrap-unwrap-CloseScreen.patch: drop, causes other
 bugs that are worse than CVE-2023-5574.
 .
 xorg-server (2:21.1.7-3+deb12u1) bookworm-security; urgency=medium
 .
   * present-Check-for-NULL-to-prevent-crash.patch: drop, applied upstream 
since 21.1.4
   * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367)
   * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380)
   * mi: fix CloseScreen initialization order
   * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574)
Checksums-Sha1:
 98095f189c41cfe50547a1b2c1b33ab1996d0a01 4268 xorg-server_21.1.7-3+deb12u2.dsc
 d966b6c6da6ecef346b04062469a87aa0729685b 170506 
xorg-server_21.1.7-3+deb12u2.diff.gz
Checksums-Sha256:
 a4f03753eeb4c2381ecea6aea584d5e0bc1453d26c05e6dd6cd19af9323d8156 4268 
xorg-server_21.1.7-3+deb12u2.dsc
 7288e7a9aa1558830c3babbbf0acd51c87aca9848a9c5e5f65461d9ed0001829 170506 
xorg-server_21.1.7-3+deb12u2.diff.gz
Files:
 9b32d7a7b4357c038298d403e6316d15 4268 x11 optional 
xorg-server_21.1.7-3+deb12u2.dsc
 f5cece7ee06d9c61d02e32934bf29972 170506 x11 optional 
xorg-server_21.1.7-3+deb12u2.diff.gz

-BEGIN PGP SIGNATURE-

iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU4xqMUHGpjcmlzdGF1
QGRlYmlhbi5vcmcACgkQnbAjVVb4z621/g//d9XOd/M4gegoWL3ajHVuodDQXnis
u6jXdJXOK2C7D/KfN6njrhUZ5Z4YxU/rFMKdbtfM5ri8OKw5FUmKAjecLH/WlVNa
lU7bOxvKtWr5d+jLGv0vEpf/HIFyn7+DM6wXmB2vKLriwBS/qNqFi+67BMC/rYMu
VtyIO84drmRLrLIU/7hfkksT4uhx8/S67RLpcKZONRm8cDqdarVLSQ13ezkcthhl
+u7UO/KrOa1GfVIc/AyqG1iD2wBzl+Yl1BODgu6aq5TlSdFZfXLKtLXpgS5cZNIz
kb4dR3B5WIMfJwYsPYVPs6cC0gSIuF6hKkeHHn4bphDkKF/jm2HStcaSQvToQTYD
IkDzyKczcz3BolkGPUE2nlkoPk9hq9Z6Nnph64c5yixNRRvKD+Qs7HivSXGFwbad
+WNsukg/gagZE4wJCNaC/3wg2+2ANVcrInXSOUBYeePOTSKZwGAaSf/PoGO31yZt
VEjhgKgeZ12UIqXE/0OPYMZfKEqv3cvaxYncf+YX+AhE0T6rsp99sX7ljEAEfhUD
RKl09CDcMYlne8u71X1wjN7CpTTEloY5MBl2YdM5BmZEilUJr3W9vtHzT537mX+w
kyiYUTShwsgGifP1CzIOg7W+ahZkCgPdgXzIao6GS/hxCCmV74Dv4bfto/7ChCZE
Ae4b+Xli8pMsdsA=
=Igp4
-END PGP SIGNATURE-



xorg-server_1.20.11-1+deb11u7_source.changes ACCEPTED into oldstable-proposed-updates

2023-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 23 Oct 2023 19:26:14 +0200
Source: xorg-server
Architecture: source
Version: 2:1.20.11-1+deb11u7
Distribution: bullseye-security
Urgency: high
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Changes:
 xorg-server (2:1.20.11-1+deb11u7) bullseye-security; urgency=high
 .
   * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367)
   * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380)
   * mi: fix CloseScreen initialization order
   * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574)
Checksums-Sha1:
 86311b316f0efd410cd9f4d91a514fafdd4c874b 4265 xorg-server_1.20.11-1+deb11u7.dsc
 66804c44108d5abbe3e3ecc526b65946d57b9031 180629 
xorg-server_1.20.11-1+deb11u7.diff.gz
Checksums-Sha256:
 29120fbdcc671751dcdfd3d2f79e8ff9dc4dad663408d0dddb992b86e81fd849 4265 
xorg-server_1.20.11-1+deb11u7.dsc
 314b0cba569767063a40b3b5581f3f5add74064490ba1edf7d5950dc3b5b714d 180629 
xorg-server_1.20.11-1+deb11u7.diff.gz
Files:
 d0b44fc4bd0c9472f5d1ea5b75ffaa3f 4265 x11 optional 
xorg-server_1.20.11-1+deb11u7.dsc
 d146188a0e2480ef6831ed6ea50e9422 180629 x11 optional 
xorg-server_1.20.11-1+deb11u7.diff.gz

-BEGIN PGP SIGNATURE-

iQJIBAEBCgAyFiEEVXgdqzTmGgnvuIvhnbAjVVb4z60FAmU2sZgUHGpjcmlzdGF1
QGRlYmlhbi5vcmcACgkQnbAjVVb4z60fBw/9E6UDHTR9I8BWbNU0y8OSa4fi4hXN
mTL4PzYhJBLFN3/bHVrarpaRcZg2bfpCyAywz34nzLOICM6njGb534KUK6NIokol
w804I8IrHru0k5C7o4FNCU8c2z9SIqs6IZGDyL7SWS17K/TjMseURyKK5BjGYdgG
ntorWIPWv1kH0AwgfM89ys46yve8nAfbJteDDIOKHoMxHFg2+rqFdjGEoq839Gt6
xZWlat/EmluHauO0EJiOoJu+elv14695PntI9PyNTQvkcp4gINR8FNsQlBZ5ByQ+
SXCofY9jy4ZH3CfA/QrcNIFcAi93VWbq+GRIYerrdjsJqkFlbSPREVdffatRpzwh
cyF89wBwAM1yFwA3YlfS2F/70KbSmcRQg0tpw3pljfc/a2BmHBJwR4RUSDq6jWXg
jz2k14LJX0d79vqI8ZaTbHGr5u4dbAPXDbOR73s0FQ9AM0Cwu4fXqBOATYjDQyhB
kHpQpRlIiLUSJ0N9N7wskzP7+Df+Z7oHFUqnS4nbilbAf+++WwVnj566QVsOsduQ
LCVSn25BhzTx4OGJ+d8DaGgb3fGnEO/ajfFWbHG0lBHIYdm84C/RxQA8SyTtLWs8
9mQTEhQ61TgcpjGLjvdPpEpWeqJFjFSM0wou/2Cgf+c5RzIm/xk//Rrb82Oq1IJR
viX6IBugKsvWanY=
=NPFw
-END PGP SIGNATURE-



xorg-server_1.20.11-1+deb11u8_source.changes ACCEPTED into oldstable-proposed-updates

2023-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 25 Oct 2023 09:47:13 +0200
Source: xorg-server
Architecture: source
Version: 2:1.20.11-1+deb11u8
Distribution: bullseye-security
Urgency: high
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Changes:
 xorg-server (2:1.20.11-1+deb11u8) bullseye-security; urgency=high
 .
   * 0003-mi-fix-CloseScreen-initialization-order.patch,
 0004-fb-properly-wrap-unwrap-CloseScreen.patch: drop, causes other
 bugs that are worse than CVE-2023-5574.
 .
 xorg-server (2:1.20.11-1+deb11u7) bullseye-security; urgency=high
 .
   * Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367)
   * mi: reset the PointerWindows reference on screen switch (CVE-2023-5380)
   * mi: fix CloseScreen initialization order
   * fb: properly wrap/unwrap CloseScreen (CVE-2023-5574)
Checksums-Sha1:
 c42bd0055272565ec2d446b3d1ccc1a67c770421 4265 xorg-server_1.20.11-1+deb11u8.dsc
 f2e0bdb18c32319acc1e70bb4945051383b2ae98 179070 
xorg-server_1.20.11-1+deb11u8.diff.gz
Checksums-Sha256:
 21d49d32ed327c8157e772c954400568605f2645c7b68e55a690bffd07e410bd 4265 
xorg-server_1.20.11-1+deb11u8.dsc
 7e8ddb1dffeb361f2ab4e8f1ef6f3169c11ac0db7dd551e6a18a2e1f3da06c93 179070 
xorg-server_1.20.11-1+deb11u8.diff.gz
Files:
 0208a6ad02080f01486bdc533e822f4a 4265 x11 optional 
xorg-server_1.20.11-1+deb11u8.dsc
 312a2f5b47e71392fe1ec967be677d15 179070 x11 optional 
xorg-server_1.20.11-1+deb11u8.diff.gz

-BEGIN PGP SIGNATURE-
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=Mml+
-END PGP SIGNATURE-