Change log for libx11 package in Ubuntu

175 of 128 results
Published in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libx11 (2:1.8.7-1build1) noble; urgency=high

  * No change rebuild for 64-bit time_t and frame pointers.

 -- Julian Andres Klode <email address hidden>  Mon, 08 Apr 2024 18:09:07 +0200
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libx11 (2:1.8.7-1) unstable; urgency=medium

  * New upstream release.
    - CVE-2023-43785
    - CVE-2023-43786
    - CVE-2023-43787

 -- Timo Aaltonen <email address hidden>  Wed, 04 Oct 2023 13:16:19 +0300
Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libx11 (2:1.8.6-1ubuntu1) mantic; urgency=medium

  * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms()
    - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch
    - CVE-2023-43785
  * SECURITY UPDATE: stack exhaustion from infinite recursion in
    PutSubImage()
    - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch
    - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch
    - CVE-2023-43786
  * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap
    overflow
    - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch
    - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch
    - CVE-2023-43787

 -- Marc Deslauriers <email address hidden>  Tue, 03 Oct 2023 14:28:30 -0400
Published in focal-updates
Published in focal-security
libx11 (2:1.6.9-2ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms()
    - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch
    - CVE-2023-43785
  * SECURITY UPDATE: stack exhaustion from infinite recursion in
    PutSubImage()
    - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch
    - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch
    - CVE-2023-43786
  * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap
    overflow
    - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch
    - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch
    - CVE-2023-43787

 -- Marc Deslauriers <email address hidden>  Mon, 02 Oct 2023 15:14:49 -0400
Published in lunar-updates
Published in lunar-security
libx11 (2:1.8.4-2ubuntu0.3) lunar-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms()
    - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch
    - CVE-2023-43785
  * SECURITY UPDATE: stack exhaustion from infinite recursion in
    PutSubImage()
    - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch
    - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch
    - CVE-2023-43786
  * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap
    overflow
    - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch
    - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch
    - CVE-2023-43787

 -- Marc Deslauriers <email address hidden>  Mon, 02 Oct 2023 15:07:04 -0400
Published in jammy-updates
Published in jammy-security
libx11 (2:1.7.5-1ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms()
    - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch
    - CVE-2023-43785
  * SECURITY UPDATE: stack exhaustion from infinite recursion in
    PutSubImage()
    - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch
    - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch
    - CVE-2023-43786
  * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap
    overflow
    - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch
    - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch
    - CVE-2023-43787

 -- Marc Deslauriers <email address hidden>  Mon, 02 Oct 2023 15:13:58 -0400
Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libx11 (2:1.8.6-1) unstable; urgency=medium

  * Team upload.
  * New upstream release
    - InitExt.c: Add bounds checks for extension request, event, & error codes
      (CVE-2023-3138)

 -- Julien Cristau <email address hidden>  Fri, 16 Jun 2023 14:36:12 +0200
Superseded in mantic-proposed
libx11 (2:1.8.4-2ubuntu1) mantic; urgency=medium

  * SECURITY UPDATE: multiple buffer overflows
    - debian/patches/CVE-2023-3138.patch: add bounds checks for extension
      request, event, & error codes in src/InitExt.c.
    - CVE-2023-3138

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 07:23:54 -0400
Superseded in jammy-updates
Superseded in jammy-security
libx11 (2:1.7.5-1ubuntu0.2) jammy-security; urgency=medium

  * SECURITY UPDATE: multiple buffer overflows
    - debian/patches/CVE-2023-3138.patch: add bounds checks for extension
      request, event, & error codes in src/InitExt.c.
    - CVE-2023-3138

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 07:25:59 -0400
Superseded in lunar-updates
Superseded in lunar-security
libx11 (2:1.8.4-2ubuntu0.2) lunar-security; urgency=medium

  * SECURITY UPDATE: multiple buffer overflows
    - debian/patches/CVE-2023-3138.patch: add bounds checks for extension
      request, event, & error codes in src/InitExt.c.
    - CVE-2023-3138

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 07:24:29 -0400
Superseded in focal-updates
Superseded in focal-security
libx11 (2:1.6.9-2ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: multiple buffer overflows
    - debian/patches/CVE-2023-3138.patch: add bounds checks for extension
      request, event, & error codes in src/InitExt.c.
    - CVE-2023-3138
  * This update does _not_ contain the changes from 2:1.6.9-2ubuntu1.3 in
    focal-proposed.

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 07:26:48 -0400
Obsolete in kinetic-updates
Obsolete in kinetic-security
libx11 (2:1.8.1-2ubuntu0.2) kinetic-security; urgency=medium

  * SECURITY UPDATE: multiple buffer overflows
    - debian/patches/CVE-2023-3138.patch: add bounds checks for extension
      request, event, & error codes in src/InitExt.c.
    - CVE-2023-3138

 -- Marc Deslauriers <email address hidden>  Tue, 13 Jun 2023 07:25:17 -0400
Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libx11 (2:1.8.4-2) unstable; urgency=medium

  * rules: Drop --disable-thread-safety-constructor again.

 -- Timo Aaltonen <email address hidden>  Mon, 27 Feb 2023 20:31:15 +0200

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libx11 (2:1.8.3-3) unstable; urgency=medium

  * Revert yet another commit causing regressions. (Closes: #1026809)

 -- Timo Aaltonen <email address hidden>  Fri, 23 Dec 2022 12:57:26 +0200
Superseded in lunar-proposed
libx11 (2:1.8.3-2) unstable; urgency=medium

  [ Debian Janitor ]
  * Remove constraints unnecessary since buster (oldstable):
    + Build-Depends: Drop versioned constraint on dpkg-dev, libxcb1-dev and
      xutils-dev.
    + Build-Depends-Indep: Drop versioned constraint on xorg-sgml-doctools.
    + libx11-data: Drop versioned constraint on libx11-6 in Breaks.
    + libx11-dev: Drop versioned constraint on libxau-dev and libxdmcp-dev in
      Depends.
    + libx11-xcb-dev: Drop versioned constraint on libxcb1-dev in Depends.
    + libx11-doc: Drop versioned constraint on libx11-dev in Replaces.
    + libx11-doc: Drop versioned constraint on libx11-dev in Breaks.

  [ Timo Aaltonen ]
  * patches: Revert four commits to fix a regression which is still
    unfixed.
  * rules: Add --disable-thread-safety-constructor again.
  * rules: NEWS got removed, don't try to install it.
  * symbols: Updated.

 -- Timo Aaltonen <email address hidden>  Tue, 20 Dec 2022 17:02:56 +0200
Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libx11 (2:1.8.1-2) unstable; urgency=medium

  * rules: Disable thread safety constructor. (Closes: #1016363)

 -- Timo Aaltonen <email address hidden>  Thu, 04 Aug 2022 09:21:33 +0300

Available diffs

Superseded in kinetic-proposed
libx11 (2:1.8.1-1) unstable; urgency=medium

  * New upstream release.

 -- Timo Aaltonen <email address hidden>  Fri, 29 Jul 2022 11:11:37 +0300
Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libx11 (2:1.7.5-1) unstable; urgency=medium

  * New upstream release. (Closes: #1008890)

 -- Timo Aaltonen <email address hidden>  Sun, 03 Apr 2022 22:29:52 +0300
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libx11 (2:1.7.2-2build1) jammy; urgency=high

  * No change rebuild for ppc64el baseline bump.

 -- Julian Andres Klode <email address hidden>  Thu, 24 Mar 2022 17:15:01 +0100
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libx11 (2:1.7.2-2) unstable; urgency=medium

  * Add an upstream commit to handle new _EVDEVK symbols.

 -- Timo Aaltonen <email address hidden>  Wed, 15 Sep 2021 09:18:20 +0300

Available diffs

Deleted in bionic-proposed (Reason: The package was removed because its target series is goin...)
libx11 (2:1.6.4-3ubuntu0.5) bionic; urgency=medium

  * Fix a race condition in poll_for_response. (LP: #1782984)

 -- Timo Aaltonen <email address hidden>  Thu, 05 Aug 2021 10:23:56 +0300
Deleted in focal-proposed (Reason: moved to -updates)
libx11 (2:1.6.9-2ubuntu1.3) focal; urgency=medium

  * Fix a race condition in poll_for_response. (LP: #1782984)

 -- Timo Aaltonen <email address hidden>  Thu, 05 Aug 2021 10:23:56 +0300
Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libx11 (2:1.7.2-1) unstable; urgency=medium

  [ Timo Aaltonen ]
  * New upstream release. (Closes: #990998)

  [ Julien Cristau ]
  * Fix Vcs-Git control field.

 -- Timo Aaltonen <email address hidden>  Mon, 26 Jul 2021 11:29:39 +0300

Available diffs

Superseded in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libx11 (2:1.7.1-1) unstable; urgency=medium

  [ Julien Cristau ]
  * libx11-6 Breaks old libx11-xcb1, as further mitigation for bug
    #979590.

  [ Emilio Pozuelo Monfort ]
  * New upstream release.
  * CVE-2021-31535: X protocol command injection due to missing request
    length checks (closes: #988737)

 -- Emilio Pozuelo Monfort <email address hidden>  Wed, 19 May 2021 17:22:09 +0200
Superseded in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libx11 (2:1.7.0-2ubuntu1) impish; urgency=medium

  * SECURITY UPDATE: extra X protocol requests via unchecked string lengths
    - debian/patches/CVE-2021-31535.patch: reject strings longer than
      USHRT_MAX before sending them on the wire in src/Font.c,
      src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c,
      src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c,
      src/SetHints.c, src/StNColor.c, src/StName.c .
    - CVE-2021-31535

 -- Marc Deslauriers <email address hidden>  Wed, 19 May 2021 13:00:59 -0400
Obsolete in groovy-updates
Obsolete in groovy-security
libx11 (2:1.6.12-1ubuntu0.1) groovy-security; urgency=medium

  * SECURITY UPDATE: extra X protocol requests via unchecked string lengths
    - debian/patches/CVE-2021-31535.patch: reject strings longer than
      USHRT_MAX before sending them on the wire in src/Font.c,
      src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c,
      src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c,
      src/SetHints.c, src/StNColor.c, src/StName.c .
    - CVE-2021-31535

 -- Marc Deslauriers <email address hidden>  Wed, 19 May 2021 13:04:27 -0400
Obsolete in hirsute-updates
Obsolete in hirsute-security
libx11 (2:1.7.0-2ubuntu0.1) hirsute-security; urgency=medium

  * SECURITY UPDATE: extra X protocol requests via unchecked string lengths
    - debian/patches/CVE-2021-31535.patch: reject strings longer than
      USHRT_MAX before sending them on the wire in src/Font.c,
      src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c,
      src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c,
      src/SetHints.c, src/StNColor.c, src/StName.c .
    - CVE-2021-31535

 -- Marc Deslauriers <email address hidden>  Wed, 19 May 2021 13:00:59 -0400
Superseded in focal-updates
Superseded in focal-security
libx11 (2:1.6.9-2ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: extra X protocol requests via unchecked string lengths
    - debian/patches/CVE-2021-31535.patch: reject strings longer than
      USHRT_MAX before sending them on the wire in src/Font.c,
      src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c,
      src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c,
      src/SetHints.c, src/StNColor.c, src/StName.c .
    - CVE-2021-31535

 -- Marc Deslauriers <email address hidden>  Wed, 19 May 2021 13:07:18 -0400
Published in bionic-updates
Published in bionic-security
libx11 (2:1.6.4-3ubuntu0.4) bionic-security; urgency=medium

  * SECURITY UPDATE: extra X protocol requests via unchecked string lengths
    - debian/patches/CVE-2021-31535.patch: reject strings longer than
      USHRT_MAX before sending them on the wire in src/Font.c,
      src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c,
      src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c,
      src/SetHints.c, src/StNColor.c, src/StName.c .
    - CVE-2021-31535

 -- Marc Deslauriers <email address hidden>  Wed, 19 May 2021 13:07:50 -0400
Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libx11 (2:1.7.0-2build2) hirsute; urgency=medium

  * No-change rebuild to drop the udeb package.

 -- Matthias Klose <email address hidden>  Fri, 26 Feb 2021 08:11:23 +0100
Superseded in hirsute-proposed
libx11 (2:1.7.0-2build1) hirsute; urgency=medium

  * No-change rebuild to drop the udeb package.

 -- Matthias Klose <email address hidden>  Mon, 22 Feb 2021 10:34:58 +0100
Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libx11 (2:1.7.0-2) unstable; urgency=medium

  * Set a strict dependency of libx11-xcb1 on libx11-6, as internal ABI
    may change across releases - and indeed did change between 1.6.12 and
    1.7.0 (closes: #979590)
  * Update upstream git URL in package descriptions.

 -- Julien Cristau <email address hidden>  Mon, 11 Jan 2021 12:15:25 +0100

Available diffs

Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libx11 (2:1.7.0-1) unstable; urgency=medium

  * New upstream release.
  * patches: Refreshed.
  * signing-key: Added key from Keith Packard.
  * symbols: Updated.

 -- Timo Aaltonen <email address hidden>  Wed, 06 Jan 2021 20:47:58 +0200

Available diffs

Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
libx11 (2:1.6.12-1) unstable; urgency=medium

  * New upstream release.
  * 001_xim_regression.diff: Dropped, upstream.

 -- Timo Aaltonen <email address hidden>  Thu, 17 Sep 2020 13:11:41 +0300

Available diffs

Published in precise-updates
Published in precise-security
libx11 (2:1.4.99.1-0ubuntu2.5) precise-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: integer overflow and heap overflow in XIM client
    - debian/patches/CVE-2020-14344-1.patch: fix signed length values in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions
      in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c.
    - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter
      to CARD16 in modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-6.patch: fix size calculation in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting
      to server in modules/im/ximcp/imRmAttr.c.
    - CVE-2020-14344
  * SECURITY UPDATE: integer overflow and double free in locale handling
    - debian/patches/CVE-2020-14363.patch: fix an integer overflow in
      modules/om/generic/omGeneric.c.
    - CVE-2020-14363

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 02 Sep 2020 13:42:13 -0300
Published in xenial-updates
Published in xenial-security
libx11 (2:1.6.3-1ubuntu2.2) xenial-security; urgency=medium

  * SECURITY UPDATE: integer overflow and heap overflow in XIM client
    - debian/patches/CVE-2020-14344-1.patch: fix signed length values in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions
      in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c.
    - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter
      to CARD16 in modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-6.patch: fix size calculation in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting
      to server in modules/im/ximcp/imRmAttr.c.
    - CVE-2020-14344
  * SECURITY UPDATE: integer overflow and double free in locale handling
    - debian/patches/CVE-2020-14363.patch: fix an integer overflow in
      modules/om/generic/omGeneric.c.
    - CVE-2020-14363

 -- Marc Deslauriers <email address hidden>  Mon, 31 Aug 2020 12:11:23 -0400
Superseded in bionic-updates
Superseded in bionic-security
libx11 (2:1.6.4-3ubuntu0.3) bionic-security; urgency=medium

  * SECURITY UPDATE: integer overflow and heap overflow in XIM client
    - debian/patches/CVE-2020-14344-1.patch: fix signed length values in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions
      in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c.
    - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter
      to CARD16 in modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-6.patch: fix size calculation in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting
      to server in modules/im/ximcp/imRmAttr.c.
    - CVE-2020-14344
  * SECURITY UPDATE: integer overflow and double free in locale handling
    - debian/patches/CVE-2020-14363.patch: fix an integer overflow in
      modules/om/generic/omGeneric.c.
    - CVE-2020-14363

 -- Marc Deslauriers <email address hidden>  Mon, 31 Aug 2020 12:10:10 -0400
Superseded in focal-updates
Superseded in focal-security
libx11 (2:1.6.9-2ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: integer overflow and heap overflow in XIM client
    - debian/patches/CVE-2020-14344-1.patch: fix signed length values in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions
      in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c.
    - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter
      to CARD16 in modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-6.patch: fix size calculation in
      modules/im/ximcp/imRmAttr.c.
    - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting
      to server in modules/im/ximcp/imRmAttr.c.
    - CVE-2020-14344
  * SECURITY UPDATE: integer overflow and double free in locale handling
    - debian/patches/CVE-2020-14363.patch: fix an integer overflow in
      modules/om/generic/omGeneric.c.
    - CVE-2020-14363

 -- Marc Deslauriers <email address hidden>  Mon, 31 Aug 2020 11:51:55 -0400
Superseded in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
libx11 (2:1.6.10-3) unstable; urgency=medium

  * Fix 001_xim_regression.diff to actually build.

 -- Julien Cristau <email address hidden>  Mon, 03 Aug 2020 08:44:37 +0200
Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libx11 (2:1.6.9-2ubuntu1) focal; urgency=medium

  * control: Bump build-dep on x11proto-dev to make sure we have all
    the new keysyms.

 -- Timo Aaltonen <email address hidden>  Mon, 09 Mar 2020 14:45:02 +0200
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libx11 (2:1.6.9-2) unstable; urgency=medium

  * control: Depend on x11proto-dev instead of the old protos, bump the
    version.
  * control: libx11-dev Replaces old x11proto-dev. (Closes: #952589)

 -- Timo Aaltonen <email address hidden>  Wed, 26 Feb 2020 18:40:14 +0200

Available diffs

Superseded in focal-proposed
libx11 (2:1.6.9-1) unstable; urgency=medium

  * New upstream release.
  * control: Use debhelper-compat, bump to 12.
  * signing-key.asc: Add Adam Jackson's key.
  * rules: Remove .la files before install.
  * rules: Use -a instead of -s for dh_makeshlibs.
  * watch: Update upstream url.
  * control: Bump policy to 4.5.0.

 -- Timo Aaltonen <email address hidden>  Wed, 26 Feb 2020 14:32:15 +0200
Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to Release)
libx11 (2:1.6.8-1) unstable; urgency=medium

  [ Timo Aaltonen ]
  * New upstream release.
  * patches: Refreshed.

  [ Helmut Grohne ]
  * Move documentation dependencies to Build-Depends-Indep. (Closes: #928878)

 -- Timo Aaltonen <email address hidden>  Wed, 18 Sep 2019 17:09:31 +0300

Available diffs

Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
libx11 (2:1.6.4-3ubuntu0.2) bionic; urgency=medium

  * call-poll-for-event-again.diff: Fix constant video freezes on
    firefox with amdgpu. (LP: #1815125)

 -- Timo Aaltonen <email address hidden>  Thu, 07 Feb 2019 22:04:25 +0200
Superseded in eoan-release
Obsolete in disco-release
Obsolete in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
libx11 (2:1.6.7-1) unstable; urgency=medium

  * New upstream release.
    - fix video freezing in firefox with amdgpu
  * upstream: Add key from Matt Turner.

 -- Timo Aaltonen <email address hidden>  Tue, 09 Oct 2018 18:03:26 +0300

Available diffs

Published in trusty-updates
Published in trusty-security
libx11 (2:1.6.2-1ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2016-7942.patch: fix in src/GetImage.c.
    - CVE-2016-7942
  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2016-7943.patch: fix in src/FontNames.c,
      src/ListExt.c, src/ModMap.c.
    - CVE-2016-7943
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c,
      src/ListExt.c.
    - CVE-2018-14598
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c,
      src/GetFPath.c, src/ListExt.c.
    - CVE-2018-14599
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath.
    - CVE-2018-14600

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 30 Aug 2018 10:34:11 -0300
Superseded in xenial-updates
Superseded in xenial-security
libx11 (2:1.6.3-1ubuntu2.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2016-7942.patch: fix in src/GetImage.c.
    - CVE-2016-7942
  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2016-7943.patch: fix in src/FontNames.c,
      src/ListExt.c, src/ModMap.c.
    - CVE-2016-7943
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c,
      src/ListExt.c.
    - CVE-2018-14598
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c,
      src/GetFPath.c, src/ListExt.c.
    - CVE-2018-14599
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath.
    - CVE-2018-14600

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 29 Aug 2018 17:04:57 -0300
Superseded in bionic-updates
Superseded in bionic-security
libx11 (2:1.6.4-3ubuntu0.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c,
      src/ListExt.c.
    - CVE-2018-14598
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c,
      src/GetFPath.c, src/ListExt.c.
    - CVE-2018-14599
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath.
    - CVE-2018-14600

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 29 Aug 2018 15:18:18 -0300
Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
libx11 (2:1.6.6-1) unstable; urgency=medium

  * New upstream release.
    - Fixes CVE-2018-14598, CVE-2018-14599 and CVE-2018-14600.
  * Move libx11-doc from Recommends to Suggests (Closes: #648443).
  * Add debian/README.source
  * Set source format to 1.0.
  * Bump standards version to 4.2.0.

 -- Andreas Boll <email address hidden>  Wed, 22 Aug 2018 21:22:31 +0200
Superseded in cosmic-proposed
libx11 (2:1.6.5-1) unstable; urgency=medium

  * Add Matt Turner's key to d/u/signing-key.asc
  * New upstream release.
  * Update VCS metadata for move to salsa.

 -- Julien Cristau <email address hidden>  Sun, 18 Mar 2018 16:22:50 +0100
Superseded in cosmic-release
Published in bionic-release
Obsolete in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libx11 (2:1.6.4-3) unstable; urgency=high

  [ Emilio Pozuelo Monfort ]
  * debian/libx11-6.symbols: use arch-bits=64 rather than listing all
    64-bits architectures, which is not future-proof.

  [ Julien Cristau ]
  * Fix two regressions introduced in 2:1.6.4-1:
    + Fix wrong Xfree in XListFonts failure path
    + Revert cs_CZ.UTF-8 XLC_LOCALE to en_US.UTF-8 (closes: #847345)
  * Build-depend on dpkg-dev 1.18.0 for arch-bits support in dpkg-gensymbols.

 -- Julien Cristau <email address hidden>  Sat, 28 Jan 2017 00:06:50 +0100
Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libx11 (2:1.6.3-1ubuntu3) yakkety; urgency=medium

  [ Mats Blakstad ]
  * debian/patches/017_togo_compose_keys.diff:
    - Compose keys for local languages in Togo (LP: #1584314)

 -- Gunnar Hjalmarsson <email address hidden>  Mon, 23 May 2016 18:55:00 +0200
Superseded in yakkety-release
Published in xenial-release
Obsolete in wily-release
Deleted in wily-proposed (Reason: moved to release)
libx11 (2:1.6.3-1ubuntu2) wily; urgency=medium

  * debian/patches/016_add_pt_PT.UTF-8_Compose.diff:
    - Add compose file for pt_PT.UTF-8 equivalent to pt_BR.UTF-8
      (LP: #518056).

 -- Gunnar Hjalmarsson <email address hidden>  Fri, 18 Sep 2015 13:45:21 +0200
Superseded in wily-release
Deleted in wily-proposed (Reason: moved to release)
libx11 (2:1.6.3-1ubuntu1) wily; urgency=low

  * Merge from Debian unstable. (LP: #1455797) Remaining changes:
    - debian/control:
      + Do not build the .txt files; w3m currently crashes on them.

Superseded in precise-updates
Superseded in precise-security
libx11 (2:1.4.99.1-0ubuntu2.3) precise-security; urgency=medium

  * SECURITY UPDATE: buffer overflow in MakeBigReq (LP: #1441381)
    - debian/patches/makebigreq_overflow.patch: don't move the last word in
      MakeBigReq in include/X11/Xlibint.h.
    - CVE number pending
 -- Marc Deslauriers <email address hidden>   Wed, 08 Apr 2015 08:01:09 -0400
Superseded in wily-release
Obsolete in vivid-release
Obsolete in utopic-release
Deleted in utopic-proposed (Reason: moved to release)
libx11 (2:1.6.2-2ubuntu2) utopic; urgency=medium

  * Merge with Debian; remaining changes:
    - Update symbols file for ppc64el.
    - Do not build the .txt files; w3m currently crashes on them.
 -- Matthias Klose <email address hidden>   Mon, 04 Aug 2014 11:20:36 +0200
Superseded in utopic-proposed
libx11 (2:1.6.2-2ubuntu1) utopic; urgency=medium

  * Merge with Debian; remaining changes:
    - Update symbols file for ppc64el.

Superseded in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libx11 (2:1.6.2-1ubuntu2) trusty; urgency=low

  * Update libx11 symbols file.
 -- Matthias Klose <email address hidden>   Wed, 04 Dec 2013 18:32:44 +0100
Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libx11 (2:1.6.2-1ubuntu1) trusty; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Do not build the .txt files; w3m currently crashes on them.
    - Declare libx11-xcb-dev Multi-Arch: same.

Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libx11 (2:1.6.1-1ubuntu2) trusty; urgency=low

  * Declare libx11-xcb-dev Multi-Arch: same.
 -- Colin Watson <email address hidden>   Wed, 23 Oct 2013 16:42:10 +0100
Superseded in trusty-release
Obsolete in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
libx11 (2:1.6.1-1ubuntu1) saucy; urgency=low

  * Do not build the .txt files, w3m  currently crashes on them.
 -- Maarten Lankhorst <email address hidden>   Wed, 02 Oct 2013 22:45:10 +0200
Superseded in saucy-proposed
libx11 (2:1.6.1-1) unstable; urgency=low


  [ Julien Cristau ]
  * New upstream release
  * libx11-6.symbols: add powerpc64 to the list of 64bit archs (closes: #613820)

  [ Wookey ]
  * Update symbols file for arm64

 -- Julien Cristau <email address hidden>  Mon, 12 Aug 2013 17:55:45 +0200
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
libx11 (2:1.4.99.1-0ubuntu2.2) precise; urgency=low

  * Rebuild against SRUed x11-proto-core (LP: #408903)
 -- Iain Lane <email address hidden>   Mon, 22 Jul 2013 11:09:59 +0100
Superseded in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
libx11 (2:1.5.0-1ubuntu2) saucy; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows.
    - CVE-2013-1981
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1997.patch: properly calculate lengths.
    - CVE-2013-1997
  * SECURITY UPDATE: denial of service and possible code execution via
    stack overflow from recursive #include
    - debian/patches/CVE-2013-2004.patch: set limit on depth.
    - CVE-2013-2004
  * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by
    default.
  * debian/patches/ftbfs_new_automake.patch: fix ftbfs with newer
    automake.
 -- Marc Deslauriers <email address hidden>   Wed, 05 Jun 2013 15:40:48 -0400
Obsolete in raring-updates
Obsolete in raring-security
libx11 (2:1.5.0-1ubuntu1.1) raring-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows.
    - CVE-2013-1981
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1997.patch: properly calculate lengths.
    - CVE-2013-1997
  * SECURITY UPDATE: denial of service and possible code execution via
    stack overflow from recursive #include
    - debian/patches/CVE-2013-2004.patch: set limit on depth.
    - CVE-2013-2004
  * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by
    default.
 -- Marc Deslauriers <email address hidden>   Wed, 29 May 2013 16:02:41 -0400
Obsolete in quantal-updates
Obsolete in quantal-security
libx11 (2:1.5.0-1ubuntu0.1) quantal-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows.
    - CVE-2013-1981
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1997.patch: properly calculate lengths.
    - CVE-2013-1997
  * SECURITY UPDATE: denial of service and possible code execution via
    stack overflow from recursive #include
    - debian/patches/CVE-2013-2004.patch: set limit on depth.
    - CVE-2013-2004
  * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by
    default.
 -- Marc Deslauriers <email address hidden>   Wed, 29 May 2013 16:12:52 -0400
Obsolete in lucid-updates
Obsolete in lucid-security
libx11 (2:1.3.2-1ubuntu3.1) lucid-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows.
    - CVE-2013-1981
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1997.patch: properly calculate lengths.
    - CVE-2013-1997
  * SECURITY UPDATE: denial of service and possible code execution via
    stack overflow from recursive #include
    - debian/patches/CVE-2013-2004.patch: set limit on depth.
    - CVE-2013-2004
  * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by
    default.
 -- Marc Deslauriers <email address hidden>   Wed, 29 May 2013 16:38:42 -0400
Superseded in precise-updates
Superseded in precise-security
libx11 (2:1.4.99.1-0ubuntu2.1) precise-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect memory size calculations
    - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows.
    - CVE-2013-1981
  * SECURITY UPDATE: denial of service and possible code execution via
    incorrect length and bounds checking
    - debian/patches/CVE-2013-1997.patch: properly calculate lengths.
    - CVE-2013-1997
  * SECURITY UPDATE: denial of service and possible code execution via
    stack overflow from recursive #include
    - debian/patches/CVE-2013-2004.patch: set limit on depth.
    - CVE-2013-2004
  * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by
    default.
 -- Marc Deslauriers <email address hidden>   Wed, 29 May 2013 16:20:21 -0400
Superseded in saucy-release
Obsolete in raring-release
Deleted in raring-proposed (Reason: moved to release)
libx11 (2:1.5.0-1ubuntu1) raring; urgency=low

  * Update symbols file for arm64
    (LP: #1129389)
 -- Wookey <email address hidden>   Mon, 18 Feb 2013 18:52:21 +0000
Superseded in raring-release
Obsolete in quantal-release
libx11 (2:1.5.0-1) unstable; urgency=low


  * New upstream release. Visible changes:
    - Add APL support, yay!
    - A few duplicated Compose sequences were tweaked or removed. Affected
      characters are: Ã / µ / Ñ / ñ / ¹ / ² / ³ / Ó / ó / Ǻ / ǻ.
  * Drop patch, fixed upstream:
    - 001-configure-check-if-issetugid-is-declared.diff

 -- Cyril Brulebois <email address hidden>  Sat, 16 Jun 2012 20:32:52 +0000
Superseded in quantal-release
Published in precise-release
libx11 (2:1.4.99.1-0ubuntu2) precise; urgency=low

  * No change rebuild.  Previous package was built with a version of gcc
    that had memory initialization bug 871083.
    (LP: #928090, #931758)
 -- Bryce Harrington <email address hidden>   Tue, 28 Feb 2012 11:36:58 -0800
Superseded in precise-release
libx11 (2:1.4.99.1-0ubuntu1) precise; urgency=low

  * New upstream release.
  * Refreshed 006_tailor_pt_BR.UTF-8_Compose.diff
  * Add _XGetRequest to symbols
 -- Chase Douglas <email address hidden>   Wed, 21 Dec 2011 18:20:16 -0800
Superseded in precise-release
libx11 (2:1.4.4-4) unstable; urgency=low


  * debian/rules: since the documentation is moved to libx11-doc, the
    exception handling for libx11-xcb-dev needs to also look at libx11-doc,
    not libx11-dev.

 -- Steve Langasek <email address hidden>  Fri, 11 Nov 2011 06:51:51 -0800
Superseded in precise-release
Obsolete in oneiric-release
libx11 (2:1.4.4-2ubuntu1) oneiric; urgency=low

  * Merge from Debian unstable.

Superseded in oneiric-release
libx11 (2:1.4.4-1ubuntu1) oneiric; urgency=low

  * Merge from Debian unstable, remaining changes:
    - Add 102_double_arrows_Compose.patch: compose keys for double arrows
      (LP: 680143)
  * Remove patches for la_AU and tlh_UK, since they were declined by
    X.Org and Debian.

175 of 128 results