-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  xorg-server (SSA:2022-290-01)

New xorg-server packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/xorg-server-1.20.14-i586-4_slack15.0.txz:  Rebuilt.
  xkb: proof GetCountedString against request length attacks.
  xkb: fix some possible memleaks in XkbGetKbdByName.
  xquartz: Fix a possible crash when editing the Application menu due
  to mutating immutable arrays.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-4_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-3_slack15.0.txz:  Rebuilt.
  xkb: proof GetCountedString against request length attacks.
  xkb: fix some possible memleaks in XkbGetKbdByName.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated packages for Slackware 15.0:

Updated packages for Slackware x86_64 15.0:

Updated packages for Slackware -current:

Updated packages for Slackware x86_64 -current:


MD5 signatures:
+-------------+

Slackware 15.0 packages:
ad56470274c2a999358ea74518b36ded  xorg-server-1.20.14-i586-4_slack15.0.txz
ff7b7ae6a6a336358cf45dea90fd675e  xorg-server-xephyr-1.20.14-i586-4_slack15.0.txz
78868b9a2be90fdb56a6dd2abc10501a  xorg-server-xnest-1.20.14-i586-4_slack15.0.txz
5ff72184cdf20d9a703a772c50fbfcd7  xorg-server-xvfb-1.20.14-i586-4_slack15.0.txz
2355ef202badd76d847979cef7f34178  xorg-server-xwayland-21.1.4-i586-3_slack15.0.txz

Slackware x86_64 15.0 packages:
8cf45eb1b1c6306623fe96af26300619  xorg-server-1.20.14-x86_64-4_slack15.0.txz
34646076f7f849d2a62e7dc5d4640ad2  xorg-server-xephyr-1.20.14-x86_64-4_slack15.0.txz
2c48a69c2260a2a5e90115c3c6bd99d7  xorg-server-xnest-1.20.14-x86_64-4_slack15.0.txz
489e99ba0134fc9980d07a000bcc79a6  xorg-server-xvfb-1.20.14-x86_64-4_slack15.0.txz
4f2d313ae0ccb18827f971c2306e6844  xorg-server-xwayland-21.1.4-x86_64-3_slack15.0.txz

Slackware -current packages:
6f509a043bd7291f07e7c101933cb6bf  x/xorg-server-21.1.4-i586-2.txz
b7d75709dcbe81f516c559dc63ed9894  x/xorg-server-xephyr-21.1.4-i586-2.txz
32155ecfdac5c7a436b328441cdb3210  x/xorg-server-xnest-21.1.4-i586-2.txz
4bb680912c9835fb1568095071836b12  x/xorg-server-xvfb-21.1.4-i586-2.txz
d96f55c0c6b40de6416f3680408b4517  x/xorg-server-xwayland-22.1.3-i586-2.txz

Slackware x86_64 -current packages:
360729dae1396f0560cf9cd9d37c1b1a  x/xorg-server-21.1.4-x86_64-2.txz
856ba71531d2bfd1c1ef172cbc6d446d  x/xorg-server-xephyr-21.1.4-x86_64-2.txz
2344c1cf0f7362c0648be3bf3116b13b  x/xorg-server-xnest-21.1.4-x86_64-2.txz
02f84e83c10e81d6e6f0af0e27ef7f68  x/xorg-server-xvfb-21.1.4-x86_64-2.txz
29a6da62ac25e411e730461399024913  x/xorg-server-xwayland-22.1.3-x86_64-2.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg xorg-server-*.txz


+-----+

Slackware: 2022-290-01: xorg-server Security Update

October 17, 2022
New xorg-server packages are available for Slackware 15.0 and -current to fix security issues

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/xorg-server-1.20.14-i586-4_slack15.0.txz: Rebuilt. xkb: proof GetCountedString against request length attacks. xkb: fix some possible memleaks in XkbGetKbdByName. xquartz: Fix a possible crash when editing the Application menu due to mutating immutable arrays. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553 (* Security fix *) patches/packages/xorg-server-xephyr-1.20.14-i586-4_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xnest-1.20.14-i586-4_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.20.14-i586-4_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xwayland-21.1.4-i586-3_slack15.0.txz: Rebuilt. xkb: proof GetCountedString against request length attacks. xkb: fix some possible memleaks in XkbGetKbdByName. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated packages for Slackware 15.0:
Updated packages for Slackware x86_64 15.0:
Updated packages for Slackware -current:
Updated packages for Slackware x86_64 -current:

MD5 Signatures

Slackware 15.0 packages: ad56470274c2a999358ea74518b36ded xorg-server-1.20.14-i586-4_slack15.0.txz ff7b7ae6a6a336358cf45dea90fd675e xorg-server-xephyr-1.20.14-i586-4_slack15.0.txz 78868b9a2be90fdb56a6dd2abc10501a xorg-server-xnest-1.20.14-i586-4_slack15.0.txz 5ff72184cdf20d9a703a772c50fbfcd7 xorg-server-xvfb-1.20.14-i586-4_slack15.0.txz 2355ef202badd76d847979cef7f34178 xorg-server-xwayland-21.1.4-i586-3_slack15.0.txz
Slackware x86_64 15.0 packages: 8cf45eb1b1c6306623fe96af26300619 xorg-server-1.20.14-x86_64-4_slack15.0.txz 34646076f7f849d2a62e7dc5d4640ad2 xorg-server-xephyr-1.20.14-x86_64-4_slack15.0.txz 2c48a69c2260a2a5e90115c3c6bd99d7 xorg-server-xnest-1.20.14-x86_64-4_slack15.0.txz 489e99ba0134fc9980d07a000bcc79a6 xorg-server-xvfb-1.20.14-x86_64-4_slack15.0.txz 4f2d313ae0ccb18827f971c2306e6844 xorg-server-xwayland-21.1.4-x86_64-3_slack15.0.txz
Slackware -current packages: 6f509a043bd7291f07e7c101933cb6bf x/xorg-server-21.1.4-i586-2.txz b7d75709dcbe81f516c559dc63ed9894 x/xorg-server-xephyr-21.1.4-i586-2.txz 32155ecfdac5c7a436b328441cdb3210 x/xorg-server-xnest-21.1.4-i586-2.txz 4bb680912c9835fb1568095071836b12 x/xorg-server-xvfb-21.1.4-i586-2.txz d96f55c0c6b40de6416f3680408b4517 x/xorg-server-xwayland-22.1.3-i586-2.txz
Slackware x86_64 -current packages: 360729dae1396f0560cf9cd9d37c1b1a x/xorg-server-21.1.4-x86_64-2.txz 856ba71531d2bfd1c1ef172cbc6d446d x/xorg-server-xephyr-21.1.4-x86_64-2.txz 2344c1cf0f7362c0648be3bf3116b13b x/xorg-server-xnest-21.1.4-x86_64-2.txz 02f84e83c10e81d6e6f0af0e27ef7f68 x/xorg-server-xvfb-21.1.4-x86_64-2.txz 29a6da62ac25e411e730461399024913 x/xorg-server-xwayland-22.1.3-x86_64-2.txz

Severity
[slackware-security] xorg-server (SSA:2022-290-01)
New xorg-server packages are available for Slackware 15.0 and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the packages as root: # upgradepkg xorg-server-*.txz

Related News