Accepted xorg-server 2:1.20.11-1+deb11u8 (source) into oldstable-proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted xorg-server 2:1.20.11-1+deb11u8 (source) into oldstable-proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 28 Oct 2023 20:34:49 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: xorg-server_1.20.11-1+deb11u8_source.changes
- Debian-source: xorg-server
- Debian-suite: oldstable-proposed-updates
- Debian-version: 2:1.20.11-1+deb11u8
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=7TNxymAiyEdhcvzyd5dFZCQOewnGtNlXjlSf9NG5ffU=; b=orqhBb5ifAzi7YTiRCd1b4ginW J5azvAX9J/8qKVUHzgQYdPsbAJg2f+wyidOeE6EWy5jqo3HiqJtZ8unAueVTTsiRN4B6t8BRZ5UVn NdlLeUScTNqpgDodsS4ML2HN/EuyxOeabBzgxUuk8f4PPkOkiFrZfpxiCBwPa8VfyQmBmqxxSJUKP 2OGUocMrvJZaW4lEblJ05m+LKHb2x8uNoypPaEqpOmCT2q0uAIUVjAhEJgtjVCiHMMoIE4dQYXpb/ HiEsDeDsfeWuiOgOaCboArJ//vsKrc3sSYHGBCx4M4qfRxcO5oKIVoGlwkj4Cl50ujI6EjKSCaRcx jUcscqMQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qwq1B-000ztq-Gk@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 25 Oct 2023 09:47:13 +0200
Source: xorg-server
Architecture: source
Version: 2:1.20.11-1+deb11u8
Distribution: bullseye-security
Urgency: high
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Changes:
xorg-server (2:1.20.11-1+deb11u8) bullseye-security; urgency=high
.
* 0003-mi-fix-CloseScreen-initialization-order.patch,
0004-fb-properly-wrap-unwrap-CloseScreen.patch: drop, causes other
bugs that are worse than CVE-2023-5574.
.
xorg-server (2:1.20.11-1+deb11u7) bullseye-security; urgency=high
.
* Xi/randr: fix handling of PropModeAppend/Prepend (CVE-2023-5367)
* mi: reset the PointerWindows reference on screen switch (CVE-2023-5380)
* mi: fix CloseScreen initialization order
* fb: properly wrap/unwrap CloseScreen (CVE-2023-5574)
Checksums-Sha1:
c42bd0055272565ec2d446b3d1ccc1a67c770421 4265 xorg-server_1.20.11-1+deb11u8.dsc
f2e0bdb18c32319acc1e70bb4945051383b2ae98 179070 xorg-server_1.20.11-1+deb11u8.diff.gz
Checksums-Sha256:
21d49d32ed327c8157e772c954400568605f2645c7b68e55a690bffd07e410bd 4265 xorg-server_1.20.11-1+deb11u8.dsc
7e8ddb1dffeb361f2ab4e8f1ef6f3169c11ac0db7dd551e6a18a2e1f3da06c93 179070 xorg-server_1.20.11-1+deb11u8.diff.gz
Files:
0208a6ad02080f01486bdc533e822f4a 4265 x11 optional xorg-server_1.20.11-1+deb11u8.dsc
312a2f5b47e71392fe1ec967be677d15 179070 x11 optional xorg-server_1.20.11-1+deb11u8.diff.gz
-----BEGIN PGP SIGNATURE-----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=Mml+
-----END PGP SIGNATURE-----