ChangeLog for: 2025-02-25 23:24:01

a/gettext-0.24-x86_64-1.txz: Upgraded. a/shadow-4.17.3-x86_64-1.txz: Upgraded. More refactoring, but it mostly hits the non-PAM code paths. d/gettext-tools-0.24-x86_64-1.txz: Upgraded. d/python-setuptools-75.8.1-x86_64-1.txz: Upgraded. l/PyQt-builder-1.18.1-x86_64-1.txz: Upgraded. n/dhcpcd-10.2.2-x86_64-1.txz: Upgraded. x/xorg-server-21.1.16-x86_64-1.txz: Upgraded. This update fixes security issues: Use-after-free of the root cursor. Buffer overflow in XkbVModMaskText(). Heap overflow in XkbWriteKeySyms(). Buffer overflow in XkbChangeTypesOfKey(). Out-of-bounds write in CreatePointerBarrierClient(). Use of uninitialized pointer in compRedirectWindow(). Use-after-free in PlayReleasedEvents(). Use-after-free in SyncInitTrigger(). Thanks to Jan-Niklas Sohn and the Trend Micro Zero Day Initiative. For more information, see: https://lists.x.org/archives/xorg-announce/2025-February/003584.html https://www.cve.org/CVERecord?id=CVE-2025-26594 https://www.cve.org/CVERecord?id=CVE-2025-26595 https://www.cve.org/CVERecord?id=CVE-2025-26596 https://www.cve.org/CVERecord?id=CVE-2025-26597 https://www.cve.org/CVERecord?id=CVE-2025-26598 https://www.cve.org/CVERecord?id=CVE-2025-26599 https://www.cve.org/CVERecord?id=CVE-2025-26600 https://www.cve.org/CVERecord?id=CVE-2025-26601 (* Security fix *) x/xorg-server-xephyr-21.1.16-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.16-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.16-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-24.1.6-x86_64-1.txz: Upgraded. This update fixes security issues: Use-after-free of the root cursor. Buffer overflow in XkbVModMaskText(). Heap overflow in XkbWriteKeySyms(). Buffer overflow in XkbChangeTypesOfKey(). Out-of-bounds write in CreatePointerBarrierClient(). Use of uninitialized pointer in compRedirectWindow(). Use-after-free in PlayReleasedEvents(). Use-after-free in SyncInitTrigger(). Thanks to Jan-Niklas Sohn and the Trend Micro Zero Day Initiative. For more information, see: https://lists.x.org/archives/xorg-announce/2025-February/003584.html https://www.cve.org/CVERecord?id=CVE-2025-26594 https://www.cve.org/CVERecord?id=CVE-2025-26595 https://www.cve.org/CVERecord?id=CVE-2025-26596 https://www.cve.org/CVERecord?id=CVE-2025-26597 https://www.cve.org/CVERecord?id=CVE-2025-26598 https://www.cve.org/CVERecord?id=CVE-2025-26599 https://www.cve.org/CVERecord?id=CVE-2025-26600 https://www.cve.org/CVERecord?id=CVE-2025-26601 (* Security fix *) extra/tigervnc/tigervnc-1.15.0-x86_64-2.txz: Rebuilt. Recompiled against xorg-server-21.1.16, including patches for security issues: Use-after-free of the root cursor. Buffer overflow in XkbVModMaskText(). Heap overflow in XkbWriteKeySyms(). Buffer overflow in XkbChangeTypesOfKey(). Out-of-bounds write in CreatePointerBarrierClient(). Use of uninitialized pointer in compRedirectWindow(). Use-after-free in PlayReleasedEvents(). Use-after-free in SyncInitTrigger(). Thanks to Jan-Niklas Sohn and the Trend Micro Zero Day Initiative. For more information, see: https://lists.x.org/archives/xorg-announce/2025-February/003584.html https://www.cve.org/CVERecord?id=CVE-2025-26594 https://www.cve.org/CVERecord?id=CVE-2025-26595 https://www.cve.org/CVERecord?id=CVE-2025-26596 https://www.cve.org/CVERecord?id=CVE-2025-26597 https://www.cve.org/CVERecord?id=CVE-2025-26598 https://www.cve.org/CVERecord?id=CVE-2025-26599 https://www.cve.org/CVERecord?id=CVE-2025-26600 https://www.cve.org/CVERecord?id=CVE-2025-26601 (* Security fix *)