Skip to content
Snippets Groups Projects

Update from debian/bullseye-security for apertis/v2023-security

1 file
+ 9
0
Compare changes
  • Side-by-side
  • Inline
+ 24
0
xorg-server (2:1.20.11-1+deb11u13+apertis1) apertis; urgency=medium
* Sync updates from Debian Bullseye Security.
* Remaining Apertis specific changes:
+ Add patch disable-libgl-in-xwayland.patch to disable glamor and
glxvnd in xwayland to avoid Xwayland depending on big GL.
-- Apertis CI <devel@lists.apertis.org> Mon, 22 Apr 2024 07:35:32 +0000
xorg-server (2:1.20.11-1+deb11u13) bullseye-security; urgency=high
* render: Avoid possible double-free in ProcRenderAddGlyphs()
-- Julien Cristau <jcristau@debian.org> Wed, 10 Apr 2024 10:59:35 +0200
xorg-server (2:1.20.11-1+deb11u12) bullseye-security; urgency=high
* CVE-2024-31080: Heap buffer overread/data leakage in ProcXIGetSelectedEvents
* CVE-2024-31081: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice
* CVE-2024-31082: Heap buffer overread/data leakage in ProcAppleDRICreatePixmap
* CVE-2024-31083: User-after-free in ProcRenderAddGlyphs
-- Julien Cristau <jcristau@debian.org> Thu, 04 Apr 2024 15:13:36 +0200
xorg-server (2:1.20.11-1+deb11u11+apertis1) apertis; urgency=medium
* Sync updates from Debian Bullseye Security.
Loading