Change log for libx11 package in Ubuntu
1 → 75 of 128 results | First • Previous • Next • Last |
Published in oracular-release |
Published in noble-release |
Deleted in noble-proposed (Reason: Moved to noble) |
libx11 (2:1.8.7-1build1) noble; urgency=high * No change rebuild for 64-bit time_t and frame pointers. -- Julian Andres Klode <email address hidden> Mon, 08 Apr 2024 18:09:07 +0200
Available diffs
libx11 (2:1.8.7-1) unstable; urgency=medium * New upstream release. - CVE-2023-43785 - CVE-2023-43786 - CVE-2023-43787 -- Timo Aaltonen <email address hidden> Wed, 04 Oct 2023 13:16:19 +0300
Available diffs
Superseded in noble-release |
Published in mantic-release |
Deleted in mantic-proposed (Reason: Moved to mantic) |
libx11 (2:1.8.6-1ubuntu1) mantic; urgency=medium * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms() - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch - CVE-2023-43785 * SECURITY UPDATE: stack exhaustion from infinite recursion in PutSubImage() - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch - CVE-2023-43786 * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap overflow - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch - CVE-2023-43787 -- Marc Deslauriers <email address hidden> Tue, 03 Oct 2023 14:28:30 -0400
Available diffs
libx11 (2:1.6.9-2ubuntu1.6) focal-security; urgency=medium * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms() - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch - CVE-2023-43785 * SECURITY UPDATE: stack exhaustion from infinite recursion in PutSubImage() - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch - CVE-2023-43786 * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap overflow - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch - CVE-2023-43787 -- Marc Deslauriers <email address hidden> Mon, 02 Oct 2023 15:14:49 -0400
Available diffs
libx11 (2:1.8.4-2ubuntu0.3) lunar-security; urgency=medium * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms() - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch - CVE-2023-43785 * SECURITY UPDATE: stack exhaustion from infinite recursion in PutSubImage() - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch - CVE-2023-43786 * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap overflow - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch - CVE-2023-43787 -- Marc Deslauriers <email address hidden> Mon, 02 Oct 2023 15:07:04 -0400
Available diffs
libx11 (2:1.7.5-1ubuntu0.3) jammy-security; urgency=medium * SECURITY UPDATE: out-of-bounds memory access in _XkbReadKeySyms() - d/p/0001-CVE-2023-43785-out-of-bounds-memory-access-in-_XkbRe.patch - CVE-2023-43785 * SECURITY UPDATE: stack exhaustion from infinite recursion in PutSubImage() - d/p/0002-CVE-2023-43786-stack-exhaustion-from-infinite-recurs.patch - d/p/0003-XPutImage-clip-images-to-maximum-height-width-allowe.patch - CVE-2023-43786 * SECURITY UPDATE: integer overflow in XCreateImage() leading to a heap overflow - d/p/0004-XCreatePixmap-trigger-BadValue-error-for-out-of-rang.patch - d/p/0005-CVE-2023-43787-Integer-overflow-in-XCreateImage-lead.patch - CVE-2023-43787 -- Marc Deslauriers <email address hidden> Mon, 02 Oct 2023 15:13:58 -0400
Available diffs
libx11 (2:1.8.6-1) unstable; urgency=medium * Team upload. * New upstream release - InitExt.c: Add bounds checks for extension request, event, & error codes (CVE-2023-3138) -- Julien Cristau <email address hidden> Fri, 16 Jun 2023 14:36:12 +0200
Available diffs
- diff from 2:1.8.4-2 to 2:1.8.6-1 (292.7 KiB)
- diff from 2:1.8.4-2ubuntu1 (in Ubuntu) to 2:1.8.6-1 (294.1 KiB)
Superseded in mantic-proposed |
libx11 (2:1.8.4-2ubuntu1) mantic; urgency=medium * SECURITY UPDATE: multiple buffer overflows - debian/patches/CVE-2023-3138.patch: add bounds checks for extension request, event, & error codes in src/InitExt.c. - CVE-2023-3138 -- Marc Deslauriers <email address hidden> Tue, 13 Jun 2023 07:23:54 -0400
Available diffs
libx11 (2:1.7.5-1ubuntu0.2) jammy-security; urgency=medium * SECURITY UPDATE: multiple buffer overflows - debian/patches/CVE-2023-3138.patch: add bounds checks for extension request, event, & error codes in src/InitExt.c. - CVE-2023-3138 -- Marc Deslauriers <email address hidden> Tue, 13 Jun 2023 07:25:59 -0400
Available diffs
libx11 (2:1.8.4-2ubuntu0.2) lunar-security; urgency=medium * SECURITY UPDATE: multiple buffer overflows - debian/patches/CVE-2023-3138.patch: add bounds checks for extension request, event, & error codes in src/InitExt.c. - CVE-2023-3138 -- Marc Deslauriers <email address hidden> Tue, 13 Jun 2023 07:24:29 -0400
Available diffs
libx11 (2:1.6.9-2ubuntu1.5) focal-security; urgency=medium * SECURITY UPDATE: multiple buffer overflows - debian/patches/CVE-2023-3138.patch: add bounds checks for extension request, event, & error codes in src/InitExt.c. - CVE-2023-3138 * This update does _not_ contain the changes from 2:1.6.9-2ubuntu1.3 in focal-proposed. -- Marc Deslauriers <email address hidden> Tue, 13 Jun 2023 07:26:48 -0400
Available diffs
libx11 (2:1.8.1-2ubuntu0.2) kinetic-security; urgency=medium * SECURITY UPDATE: multiple buffer overflows - debian/patches/CVE-2023-3138.patch: add bounds checks for extension request, event, & error codes in src/InitExt.c. - CVE-2023-3138 -- Marc Deslauriers <email address hidden> Tue, 13 Jun 2023 07:25:17 -0400
Available diffs
Superseded in mantic-release |
Published in lunar-release |
Deleted in lunar-proposed (Reason: Moved to lunar) |
libx11 (2:1.8.4-2) unstable; urgency=medium * rules: Drop --disable-thread-safety-constructor again. -- Timo Aaltonen <email address hidden> Mon, 27 Feb 2023 20:31:15 +0200
Available diffs
- diff from 2:1.8.3-3 to 2:1.8.4-2 (238.0 KiB)
libx11 (2:1.8.3-3) unstable; urgency=medium * Revert yet another commit causing regressions. (Closes: #1026809) -- Timo Aaltonen <email address hidden> Fri, 23 Dec 2022 12:57:26 +0200
Available diffs
- diff from 2:1.8.1-2 to 2:1.8.3-3 (45.3 KiB)
- diff from 2:1.8.3-2 to 2:1.8.3-3 (924 bytes)
libx11 (2:1.8.3-2) unstable; urgency=medium [ Debian Janitor ] * Remove constraints unnecessary since buster (oldstable): + Build-Depends: Drop versioned constraint on dpkg-dev, libxcb1-dev and xutils-dev. + Build-Depends-Indep: Drop versioned constraint on xorg-sgml-doctools. + libx11-data: Drop versioned constraint on libx11-6 in Breaks. + libx11-dev: Drop versioned constraint on libxau-dev and libxdmcp-dev in Depends. + libx11-xcb-dev: Drop versioned constraint on libxcb1-dev in Depends. + libx11-doc: Drop versioned constraint on libx11-dev in Replaces. + libx11-doc: Drop versioned constraint on libx11-dev in Breaks. [ Timo Aaltonen ] * patches: Revert four commits to fix a regression which is still unfixed. * rules: Add --disable-thread-safety-constructor again. * rules: NEWS got removed, don't try to install it. * symbols: Updated. -- Timo Aaltonen <email address hidden> Tue, 20 Dec 2022 17:02:56 +0200
Superseded in lunar-release |
Obsolete in kinetic-release |
Deleted in kinetic-proposed (Reason: Moved to kinetic) |
libx11 (2:1.8.1-2) unstable; urgency=medium * rules: Disable thread safety constructor. (Closes: #1016363) -- Timo Aaltonen <email address hidden> Thu, 04 Aug 2022 09:21:33 +0300
Available diffs
- diff from 2:1.7.5-1 to 2:1.8.1-2 (126.5 KiB)
- diff from 2:1.8.1-1 to 2:1.8.1-2 (399 bytes)
libx11 (2:1.8.1-1) unstable; urgency=medium * New upstream release. -- Timo Aaltonen <email address hidden> Fri, 29 Jul 2022 11:11:37 +0300
Superseded in kinetic-release |
Published in jammy-release |
Deleted in jammy-proposed (Reason: Moved to jammy) |
libx11 (2:1.7.5-1) unstable; urgency=medium * New upstream release. (Closes: #1008890) -- Timo Aaltonen <email address hidden> Sun, 03 Apr 2022 22:29:52 +0300
Available diffs
libx11 (2:1.7.2-2build1) jammy; urgency=high * No change rebuild for ppc64el baseline bump. -- Julian Andres Klode <email address hidden> Thu, 24 Mar 2022 17:15:01 +0100
Available diffs
libx11 (2:1.7.2-2) unstable; urgency=medium * Add an upstream commit to handle new _EVDEVK symbols. -- Timo Aaltonen <email address hidden> Wed, 15 Sep 2021 09:18:20 +0300
Available diffs
- diff from 2:1.7.2-1 to 2:1.7.2-2 (1.1 KiB)
Deleted in bionic-proposed (Reason: The package was removed because its target series is goin...) |
libx11 (2:1.6.4-3ubuntu0.5) bionic; urgency=medium * Fix a race condition in poll_for_response. (LP: #1782984) -- Timo Aaltonen <email address hidden> Thu, 05 Aug 2021 10:23:56 +0300
Available diffs
Deleted in focal-proposed (Reason: moved to -updates) |
libx11 (2:1.6.9-2ubuntu1.3) focal; urgency=medium * Fix a race condition in poll_for_response. (LP: #1782984) -- Timo Aaltonen <email address hidden> Thu, 05 Aug 2021 10:23:56 +0300
Available diffs
Superseded in jammy-release |
Obsolete in impish-release |
Deleted in impish-proposed (Reason: Moved to impish) |
libx11 (2:1.7.2-1) unstable; urgency=medium [ Timo Aaltonen ] * New upstream release. (Closes: #990998) [ Julien Cristau ] * Fix Vcs-Git control field. -- Timo Aaltonen <email address hidden> Mon, 26 Jul 2021 11:29:39 +0300
Available diffs
- diff from 2:1.7.1-1 to 2:1.7.2-1 (335.2 KiB)
libx11 (2:1.7.1-1) unstable; urgency=medium [ Julien Cristau ] * libx11-6 Breaks old libx11-xcb1, as further mitigation for bug #979590. [ Emilio Pozuelo Monfort ] * New upstream release. * CVE-2021-31535: X protocol command injection due to missing request length checks (closes: #988737) -- Emilio Pozuelo Monfort <email address hidden> Wed, 19 May 2021 17:22:09 +0200
Available diffs
libx11 (2:1.7.0-2ubuntu1) impish; urgency=medium * SECURITY UPDATE: extra X protocol requests via unchecked string lengths - debian/patches/CVE-2021-31535.patch: reject strings longer than USHRT_MAX before sending them on the wire in src/Font.c, src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c, src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c, src/SetHints.c, src/StNColor.c, src/StName.c . - CVE-2021-31535 -- Marc Deslauriers <email address hidden> Wed, 19 May 2021 13:00:59 -0400
Available diffs
libx11 (2:1.6.12-1ubuntu0.1) groovy-security; urgency=medium * SECURITY UPDATE: extra X protocol requests via unchecked string lengths - debian/patches/CVE-2021-31535.patch: reject strings longer than USHRT_MAX before sending them on the wire in src/Font.c, src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c, src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c, src/SetHints.c, src/StNColor.c, src/StName.c . - CVE-2021-31535 -- Marc Deslauriers <email address hidden> Wed, 19 May 2021 13:04:27 -0400
Available diffs
libx11 (2:1.7.0-2ubuntu0.1) hirsute-security; urgency=medium * SECURITY UPDATE: extra X protocol requests via unchecked string lengths - debian/patches/CVE-2021-31535.patch: reject strings longer than USHRT_MAX before sending them on the wire in src/Font.c, src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c, src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c, src/SetHints.c, src/StNColor.c, src/StName.c . - CVE-2021-31535 -- Marc Deslauriers <email address hidden> Wed, 19 May 2021 13:00:59 -0400
Available diffs
libx11 (2:1.6.9-2ubuntu1.2) focal-security; urgency=medium * SECURITY UPDATE: extra X protocol requests via unchecked string lengths - debian/patches/CVE-2021-31535.patch: reject strings longer than USHRT_MAX before sending them on the wire in src/Font.c, src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c, src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c, src/SetHints.c, src/StNColor.c, src/StName.c . - CVE-2021-31535 -- Marc Deslauriers <email address hidden> Wed, 19 May 2021 13:07:18 -0400
Available diffs
libx11 (2:1.6.4-3ubuntu0.4) bionic-security; urgency=medium * SECURITY UPDATE: extra X protocol requests via unchecked string lengths - debian/patches/CVE-2021-31535.patch: reject strings longer than USHRT_MAX before sending them on the wire in src/Font.c, src/FontInfo.c, src/FontNames.c, src/GetColor.c, src/LoadFont.c, src/LookupCol.c, src/ParseCol.c, src/QuExt.c, src/SetFPath.c, src/SetHints.c, src/StNColor.c, src/StName.c . - CVE-2021-31535 -- Marc Deslauriers <email address hidden> Wed, 19 May 2021 13:07:50 -0400
Available diffs
Superseded in impish-release |
Obsolete in hirsute-release |
Deleted in hirsute-proposed (Reason: moved to Release) |
libx11 (2:1.7.0-2build2) hirsute; urgency=medium * No-change rebuild to drop the udeb package. -- Matthias Klose <email address hidden> Fri, 26 Feb 2021 08:11:23 +0100
Available diffs
- diff from 2:1.7.0-2 (in Debian) to 2:1.7.0-2build2 (332 bytes)
- diff from 2:1.7.0-2build1 to 2:1.7.0-2build2 (267 bytes)
Superseded in hirsute-proposed |
libx11 (2:1.7.0-2build1) hirsute; urgency=medium * No-change rebuild to drop the udeb package. -- Matthias Klose <email address hidden> Mon, 22 Feb 2021 10:34:58 +0100
Available diffs
libx11 (2:1.7.0-2) unstable; urgency=medium * Set a strict dependency of libx11-xcb1 on libx11-6, as internal ABI may change across releases - and indeed did change between 1.6.12 and 1.7.0 (closes: #979590) * Update upstream git URL in package descriptions. -- Julien Cristau <email address hidden> Mon, 11 Jan 2021 12:15:25 +0100
Available diffs
- diff from 2:1.7.0-1 to 2:1.7.0-2 (699 bytes)
libx11 (2:1.7.0-1) unstable; urgency=medium * New upstream release. * patches: Refreshed. * signing-key: Added key from Keith Packard. * symbols: Updated. -- Timo Aaltonen <email address hidden> Wed, 06 Jan 2021 20:47:58 +0200
Available diffs
- diff from 2:1.6.12-1 to 2:1.7.0-1 (136.7 KiB)
Superseded in hirsute-release |
Obsolete in groovy-release |
Deleted in groovy-proposed (Reason: moved to Release) |
libx11 (2:1.6.12-1) unstable; urgency=medium * New upstream release. * 001_xim_regression.diff: Dropped, upstream. -- Timo Aaltonen <email address hidden> Thu, 17 Sep 2020 13:11:41 +0300
Available diffs
- diff from 2:1.6.10-3 to 2:1.6.12-1 (2.9 KiB)
libx11 (2:1.4.99.1-0ubuntu2.5) precise-security; urgency=medium [ Marc Deslauriers ] * SECURITY UPDATE: integer overflow and heap overflow in XIM client - debian/patches/CVE-2020-14344-1.patch: fix signed length values in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c. - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter to CARD16 in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-6.patch: fix size calculation in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting to server in modules/im/ximcp/imRmAttr.c. - CVE-2020-14344 * SECURITY UPDATE: integer overflow and double free in locale handling - debian/patches/CVE-2020-14363.patch: fix an integer overflow in modules/om/generic/omGeneric.c. - CVE-2020-14363 -- <email address hidden> (Leonidas S. Barbosa) Wed, 02 Sep 2020 13:42:13 -0300
Available diffs
libx11 (2:1.6.3-1ubuntu2.2) xenial-security; urgency=medium * SECURITY UPDATE: integer overflow and heap overflow in XIM client - debian/patches/CVE-2020-14344-1.patch: fix signed length values in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c. - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter to CARD16 in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-6.patch: fix size calculation in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting to server in modules/im/ximcp/imRmAttr.c. - CVE-2020-14344 * SECURITY UPDATE: integer overflow and double free in locale handling - debian/patches/CVE-2020-14363.patch: fix an integer overflow in modules/om/generic/omGeneric.c. - CVE-2020-14363 -- Marc Deslauriers <email address hidden> Mon, 31 Aug 2020 12:11:23 -0400
Available diffs
libx11 (2:1.6.4-3ubuntu0.3) bionic-security; urgency=medium * SECURITY UPDATE: integer overflow and heap overflow in XIM client - debian/patches/CVE-2020-14344-1.patch: fix signed length values in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c. - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter to CARD16 in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-6.patch: fix size calculation in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting to server in modules/im/ximcp/imRmAttr.c. - CVE-2020-14344 * SECURITY UPDATE: integer overflow and double free in locale handling - debian/patches/CVE-2020-14363.patch: fix an integer overflow in modules/om/generic/omGeneric.c. - CVE-2020-14363 -- Marc Deslauriers <email address hidden> Mon, 31 Aug 2020 12:10:10 -0400
libx11 (2:1.6.9-2ubuntu1.1) focal-security; urgency=medium * SECURITY UPDATE: integer overflow and heap overflow in XIM client - debian/patches/CVE-2020-14344-1.patch: fix signed length values in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-2.patch: fix integer overflows in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-3.patch: fix more unchecked lengths in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-4.patch: zero out buffers in functions in modules/im/ximcp/imDefIc.c, modules/im/ximcp/imDefIm.c. - debian/patches/CVE-2020-14344-5.patch: change the data_len parameter to CARD16 in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-6.patch: fix size calculation in modules/im/ximcp/imRmAttr.c. - debian/patches/CVE-2020-14344-7.patch: fix input clients connecting to server in modules/im/ximcp/imRmAttr.c. - CVE-2020-14344 * SECURITY UPDATE: integer overflow and double free in locale handling - debian/patches/CVE-2020-14363.patch: fix an integer overflow in modules/om/generic/omGeneric.c. - CVE-2020-14363 -- Marc Deslauriers <email address hidden> Mon, 31 Aug 2020 11:51:55 -0400
Available diffs
libx11 (2:1.6.10-3) unstable; urgency=medium * Fix 001_xim_regression.diff to actually build. -- Julien Cristau <email address hidden> Mon, 03 Aug 2020 08:44:37 +0200
Available diffs
Superseded in groovy-release |
Published in focal-release |
Deleted in focal-proposed (Reason: moved to Release) |
libx11 (2:1.6.9-2ubuntu1) focal; urgency=medium * control: Bump build-dep on x11proto-dev to make sure we have all the new keysyms. -- Timo Aaltonen <email address hidden> Mon, 09 Mar 2020 14:45:02 +0200
Available diffs
libx11 (2:1.6.9-2) unstable; urgency=medium * control: Depend on x11proto-dev instead of the old protos, bump the version. * control: libx11-dev Replaces old x11proto-dev. (Closes: #952589) -- Timo Aaltonen <email address hidden> Wed, 26 Feb 2020 18:40:14 +0200
Available diffs
- diff from 2:1.6.8-1 to 2:1.6.9-2 (198.7 KiB)
- diff from 2:1.6.9-1 to 2:1.6.9-2 (694 bytes)
libx11 (2:1.6.9-1) unstable; urgency=medium * New upstream release. * control: Use debhelper-compat, bump to 12. * signing-key.asc: Add Adam Jackson's key. * rules: Remove .la files before install. * rules: Use -a instead of -s for dh_makeshlibs. * watch: Update upstream url. * control: Bump policy to 4.5.0. -- Timo Aaltonen <email address hidden> Wed, 26 Feb 2020 14:32:15 +0200
Superseded in focal-release |
Obsolete in eoan-release |
Deleted in eoan-proposed (Reason: moved to Release) |
libx11 (2:1.6.8-1) unstable; urgency=medium [ Timo Aaltonen ] * New upstream release. * patches: Refreshed. [ Helmut Grohne ] * Move documentation dependencies to Build-Depends-Indep. (Closes: #928878) -- Timo Aaltonen <email address hidden> Wed, 18 Sep 2019 17:09:31 +0300
Available diffs
- diff from 2:1.6.7-1 to 2:1.6.8-1 (54.0 KiB)
libx11 (2:1.6.4-3ubuntu0.2) bionic; urgency=medium * call-poll-for-event-again.diff: Fix constant video freezes on firefox with amdgpu. (LP: #1815125) -- Timo Aaltonen <email address hidden> Thu, 07 Feb 2019 22:04:25 +0200
Available diffs
Superseded in eoan-release |
Obsolete in disco-release |
Obsolete in cosmic-release |
Deleted in cosmic-proposed (Reason: moved to release) |
libx11 (2:1.6.7-1) unstable; urgency=medium * New upstream release. - fix video freezing in firefox with amdgpu * upstream: Add key from Matt Turner. -- Timo Aaltonen <email address hidden> Tue, 09 Oct 2018 18:03:26 +0300
Available diffs
- diff from 2:1.6.6-1 to 2:1.6.7-1 (25.5 KiB)
libx11 (2:1.6.2-1ubuntu2.1) trusty-security; urgency=medium * SECURITY UPDATE: Out-of-bounds read - debian/patches/CVE-2016-7942.patch: fix in src/GetImage.c. - CVE-2016-7942 * SECURITY UPDATE: Out-of-bounds read - debian/patches/CVE-2016-7943.patch: fix in src/FontNames.c, src/ListExt.c, src/ModMap.c. - CVE-2016-7943 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c, src/ListExt.c. - CVE-2018-14598 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c, src/GetFPath.c, src/ListExt.c. - CVE-2018-14599 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath. - CVE-2018-14600 -- <email address hidden> (Leonidas S. Barbosa) Thu, 30 Aug 2018 10:34:11 -0300
Available diffs
libx11 (2:1.6.3-1ubuntu2.1) xenial-security; urgency=medium * SECURITY UPDATE: Out-of-bounds read - debian/patches/CVE-2016-7942.patch: fix in src/GetImage.c. - CVE-2016-7942 * SECURITY UPDATE: Out-of-bounds read - debian/patches/CVE-2016-7943.patch: fix in src/FontNames.c, src/ListExt.c, src/ModMap.c. - CVE-2016-7943 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c, src/ListExt.c. - CVE-2018-14598 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c, src/GetFPath.c, src/ListExt.c. - CVE-2018-14599 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath. - CVE-2018-14600 -- <email address hidden> (Leonidas S. Barbosa) Wed, 29 Aug 2018 17:04:57 -0300
Available diffs
libx11 (2:1.6.4-3ubuntu0.1) bionic-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14598.patch: fix in src/GetFPath.c, src/ListExt.c. - CVE-2018-14598 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14599.patch: fix in src/FontNames.c, src/GetFPath.c, src/ListExt.c. - CVE-2018-14599 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-14600.patch: fix in src/GetFPath. - CVE-2018-14600 -- <email address hidden> (Leonidas S. Barbosa) Wed, 29 Aug 2018 15:18:18 -0300
Available diffs
libx11 (2:1.6.6-1) unstable; urgency=medium * New upstream release. - Fixes CVE-2018-14598, CVE-2018-14599 and CVE-2018-14600. * Move libx11-doc from Recommends to Suggests (Closes: #648443). * Add debian/README.source * Set source format to 1.0. * Bump standards version to 4.2.0. -- Andreas Boll <email address hidden> Wed, 22 Aug 2018 21:22:31 +0200
Available diffs
- diff from 2:1.6.4-3 to 2:1.6.6-1 (321.8 KiB)
- diff from 2:1.6.5-1 to 2:1.6.6-1 (35.9 KiB)
libx11 (2:1.6.5-1) unstable; urgency=medium * Add Matt Turner's key to d/u/signing-key.asc * New upstream release. * Update VCS metadata for move to salsa. -- Julien Cristau <email address hidden> Sun, 18 Mar 2018 16:22:50 +0100
Superseded in cosmic-release |
Published in bionic-release |
Obsolete in artful-release |
Obsolete in zesty-release |
Deleted in zesty-proposed (Reason: moved to release) |
libx11 (2:1.6.4-3) unstable; urgency=high [ Emilio Pozuelo Monfort ] * debian/libx11-6.symbols: use arch-bits=64 rather than listing all 64-bits architectures, which is not future-proof. [ Julien Cristau ] * Fix two regressions introduced in 2:1.6.4-1: + Fix wrong Xfree in XListFonts failure path + Revert cs_CZ.UTF-8 XLC_LOCALE to en_US.UTF-8 (closes: #847345) * Build-depend on dpkg-dev 1.18.0 for arch-bits support in dpkg-gensymbols. -- Julien Cristau <email address hidden> Sat, 28 Jan 2017 00:06:50 +0100
Available diffs
Superseded in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
libx11 (2:1.6.3-1ubuntu3) yakkety; urgency=medium [ Mats Blakstad ] * debian/patches/017_togo_compose_keys.diff: - Compose keys for local languages in Togo (LP: #1584314) -- Gunnar Hjalmarsson <email address hidden> Mon, 23 May 2016 18:55:00 +0200
Available diffs
Superseded in yakkety-release |
Published in xenial-release |
Obsolete in wily-release |
Deleted in wily-proposed (Reason: moved to release) |
libx11 (2:1.6.3-1ubuntu2) wily; urgency=medium * debian/patches/016_add_pt_PT.UTF-8_Compose.diff: - Add compose file for pt_PT.UTF-8 equivalent to pt_BR.UTF-8 (LP: #518056). -- Gunnar Hjalmarsson <email address hidden> Fri, 18 Sep 2015 13:45:21 +0200
Available diffs
libx11 (2:1.6.3-1ubuntu1) wily; urgency=low * Merge from Debian unstable. (LP: #1455797) Remaining changes: - debian/control: + Do not build the .txt files; w3m currently crashes on them.
Available diffs
- diff from 2:1.6.2-2ubuntu2 to 2:1.6.3-1ubuntu1 (424.4 KiB)
libx11 (2:1.4.99.1-0ubuntu2.3) precise-security; urgency=medium * SECURITY UPDATE: buffer overflow in MakeBigReq (LP: #1441381) - debian/patches/makebigreq_overflow.patch: don't move the last word in MakeBigReq in include/X11/Xlibint.h. - CVE number pending -- Marc Deslauriers <email address hidden> Wed, 08 Apr 2015 08:01:09 -0400
Available diffs
Superseded in wily-release |
Obsolete in vivid-release |
Obsolete in utopic-release |
Deleted in utopic-proposed (Reason: moved to release) |
libx11 (2:1.6.2-2ubuntu2) utopic; urgency=medium * Merge with Debian; remaining changes: - Update symbols file for ppc64el. - Do not build the .txt files; w3m currently crashes on them. -- Matthias Klose <email address hidden> Mon, 04 Aug 2014 11:20:36 +0200
Available diffs
- diff from 2:1.6.2-1ubuntu2 to 2:1.6.2-2ubuntu2 (12.3 KiB)
- diff from 2:1.6.2-2ubuntu1 to 2:1.6.2-2ubuntu2 (469 bytes)
Superseded in utopic-proposed |
libx11 (2:1.6.2-2ubuntu1) utopic; urgency=medium * Merge with Debian; remaining changes: - Update symbols file for ppc64el.
Available diffs
Superseded in utopic-release |
Published in trusty-release |
Deleted in trusty-proposed (Reason: moved to release) |
libx11 (2:1.6.2-1ubuntu2) trusty; urgency=low * Update libx11 symbols file. -- Matthias Klose <email address hidden> Wed, 04 Dec 2013 18:32:44 +0100
Available diffs
- diff from 2:1.6.2-1ubuntu1 to 2:1.6.2-1ubuntu2 (775 bytes)
libx11 (2:1.6.2-1ubuntu1) trusty; urgency=low * Resynchronise with Debian. Remaining changes: - Do not build the .txt files; w3m currently crashes on them. - Declare libx11-xcb-dev Multi-Arch: same.
Available diffs
- diff from 2:1.6.1-1ubuntu2 to 2:1.6.2-1ubuntu1 (157.1 KiB)
libx11 (2:1.6.1-1ubuntu2) trusty; urgency=low * Declare libx11-xcb-dev Multi-Arch: same. -- Colin Watson <email address hidden> Wed, 23 Oct 2013 16:42:10 +0100
Available diffs
- diff from 2:1.6.1-1ubuntu1 to 2:1.6.1-1ubuntu2 (524 bytes)
Superseded in trusty-release |
Obsolete in saucy-release |
Deleted in saucy-proposed (Reason: moved to release) |
libx11 (2:1.6.1-1ubuntu1) saucy; urgency=low * Do not build the .txt files, w3m currently crashes on them. -- Maarten Lankhorst <email address hidden> Wed, 02 Oct 2013 22:45:10 +0200
Available diffs
- diff from 2:1.5.0-1ubuntu2 to 2:1.6.1-1ubuntu1 (242.4 KiB)
- diff from 2:1.6.1-1 (in Debian) to 2:1.6.1-1ubuntu1 (621 bytes)
libx11 (2:1.6.1-1) unstable; urgency=low [ Julien Cristau ] * New upstream release * libx11-6.symbols: add powerpc64 to the list of 64bit archs (closes: #613820) [ Wookey ] * Update symbols file for arm64 -- Julien Cristau <email address hidden> Mon, 12 Aug 2013 17:55:45 +0200
Available diffs
libx11 (2:1.4.99.1-0ubuntu2.2) precise; urgency=low * Rebuild against SRUed x11-proto-core (LP: #408903) -- Iain Lane <email address hidden> Mon, 22 Jul 2013 11:09:59 +0100
Available diffs
libx11 (2:1.5.0-1ubuntu2) saucy; urgency=low * SECURITY UPDATE: denial of service and possible code execution via incorrect memory size calculations - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows. - CVE-2013-1981 * SECURITY UPDATE: denial of service and possible code execution via incorrect length and bounds checking - debian/patches/CVE-2013-1997.patch: properly calculate lengths. - CVE-2013-1997 * SECURITY UPDATE: denial of service and possible code execution via stack overflow from recursive #include - debian/patches/CVE-2013-2004.patch: set limit on depth. - CVE-2013-2004 * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by default. * debian/patches/ftbfs_new_automake.patch: fix ftbfs with newer automake. -- Marc Deslauriers <email address hidden> Wed, 05 Jun 2013 15:40:48 -0400
Available diffs
libx11 (2:1.5.0-1ubuntu1.1) raring-security; urgency=low * SECURITY UPDATE: denial of service and possible code execution via incorrect memory size calculations - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows. - CVE-2013-1981 * SECURITY UPDATE: denial of service and possible code execution via incorrect length and bounds checking - debian/patches/CVE-2013-1997.patch: properly calculate lengths. - CVE-2013-1997 * SECURITY UPDATE: denial of service and possible code execution via stack overflow from recursive #include - debian/patches/CVE-2013-2004.patch: set limit on depth. - CVE-2013-2004 * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by default. -- Marc Deslauriers <email address hidden> Wed, 29 May 2013 16:02:41 -0400
Available diffs
libx11 (2:1.5.0-1ubuntu0.1) quantal-security; urgency=low * SECURITY UPDATE: denial of service and possible code execution via incorrect memory size calculations - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows. - CVE-2013-1981 * SECURITY UPDATE: denial of service and possible code execution via incorrect length and bounds checking - debian/patches/CVE-2013-1997.patch: properly calculate lengths. - CVE-2013-1997 * SECURITY UPDATE: denial of service and possible code execution via stack overflow from recursive #include - debian/patches/CVE-2013-2004.patch: set limit on depth. - CVE-2013-2004 * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by default. -- Marc Deslauriers <email address hidden> Wed, 29 May 2013 16:12:52 -0400
Available diffs
libx11 (2:1.3.2-1ubuntu3.1) lucid-security; urgency=low * SECURITY UPDATE: denial of service and possible code execution via incorrect memory size calculations - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows. - CVE-2013-1981 * SECURITY UPDATE: denial of service and possible code execution via incorrect length and bounds checking - debian/patches/CVE-2013-1997.patch: properly calculate lengths. - CVE-2013-1997 * SECURITY UPDATE: denial of service and possible code execution via stack overflow from recursive #include - debian/patches/CVE-2013-2004.patch: set limit on depth. - CVE-2013-2004 * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by default. -- Marc Deslauriers <email address hidden> Wed, 29 May 2013 16:38:42 -0400
Available diffs
libx11 (2:1.4.99.1-0ubuntu2.1) precise-security; urgency=low * SECURITY UPDATE: denial of service and possible code execution via incorrect memory size calculations - debian/patches/CVE-2013-1981.patch: fix multiple integer overflows. - CVE-2013-1981 * SECURITY UPDATE: denial of service and possible code execution via incorrect length and bounds checking - debian/patches/CVE-2013-1997.patch: properly calculate lengths. - CVE-2013-1997 * SECURITY UPDATE: denial of service and possible code execution via stack overflow from recursive #include - debian/patches/CVE-2013-2004.patch: set limit on depth. - CVE-2013-2004 * debian/patches/001_hide_xeatdatawords.diff: Hide _XEatDataWords by default. -- Marc Deslauriers <email address hidden> Wed, 29 May 2013 16:20:21 -0400
Available diffs
Superseded in saucy-release |
Obsolete in raring-release |
Deleted in raring-proposed (Reason: moved to release) |
libx11 (2:1.5.0-1ubuntu1) raring; urgency=low * Update symbols file for arm64 (LP: #1129389) -- Wookey <email address hidden> Mon, 18 Feb 2013 18:52:21 +0000
Available diffs
libx11 (2:1.5.0-1) unstable; urgency=low * New upstream release. Visible changes: - Add APL support, yay! - A few duplicated Compose sequences were tweaked or removed. Affected characters are: Ã / µ / Ñ / ñ / ¹ / ² / ³ / Ó / ó / Ǻ / ǻ. * Drop patch, fixed upstream: - 001-configure-check-if-issetugid-is-declared.diff -- Cyril Brulebois <email address hidden> Sat, 16 Jun 2012 20:32:52 +0000
Available diffs
Superseded in precise-release |
libx11 (2:1.4.99.1-0ubuntu1) precise; urgency=low * New upstream release. * Refreshed 006_tailor_pt_BR.UTF-8_Compose.diff * Add _XGetRequest to symbols -- Chase Douglas <email address hidden> Wed, 21 Dec 2011 18:20:16 -0800
Available diffs
libx11 (2:1.4.4-4) unstable; urgency=low * debian/rules: since the documentation is moved to libx11-doc, the exception handling for libx11-xcb-dev needs to also look at libx11-doc, not libx11-dev. -- Steve Langasek <email address hidden> Fri, 11 Nov 2011 06:51:51 -0800
Available diffs
libx11 (2:1.4.4-2ubuntu1) oneiric; urgency=low * Merge from Debian unstable.
Available diffs
- diff from 2:1.4.4-1ubuntu1 to 2:1.4.4-2ubuntu1 (552 bytes)
Superseded in oneiric-release |
libx11 (2:1.4.4-1ubuntu1) oneiric; urgency=low * Merge from Debian unstable, remaining changes: - Add 102_double_arrows_Compose.patch: compose keys for double arrows (LP: 680143) * Remove patches for la_AU and tlh_UK, since they were declined by X.Org and Debian.
Available diffs
1 → 75 of 128 results | First • Previous • Next • Last |