Hello Maarten, or anyone else affected,

Accepted xorg-server into quantal-proposed. The package will build now
and be available at http://launchpad.net/ubuntu/+source/xorg-
server/2:1.13.0-0ubuntu6.1 in a few hours, and then in the -proposed
repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please change the bug tag from
verification-needed to verification-done.  If it does not, change the
tag to verification-failed.  In either case, details of your testing
will help us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg-server in Ubuntu.
https://bugs.launchpad.net/bugs/1070481

Title:
  memory corruption in xorg-server when closing acpid

Status in “xorg-server” package in Ubuntu:
  Fix Released

Bug description:
  [IMPACT] 
   * If acpid is closed before server is shutdown (for example with shutdown -h 
now, or stop acpid) a memory corruption will occur, because the acpi handler 
frees itself from a linked list before the next entry is taken. This will cause 
a reliable in valgrind, and in the worst case can cause the X server to 
shutdown uncleanly, or corrupt silently.
   * the fix is simply taking the next member before calling the handler in 
xf86WakeUp

  [TESTCASE]
   * Start X with valgrind --free-fill=fe
   * stop acpid
   * Server crashes

  [Regression Potential] 
  I don't believe there's much potential for regressions, since the code is 
called from few places, and I do not believe any of the handlers depend on the 
specific order in which they're called. Potentially suitable for precise too.

  [Other Info]
  I originally wanted to get this in before quantal release, but lost out due 
to time, but this would be more involved than converting the offending function 
to use nt_list_for_each_entry_safe.

  Original discussion at http://patchwork.freedesktop.org/patch/12156/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1070481/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to