-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  xorg-server (SSA:2022-348-03)

New xorg-server packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/xorg-server-1.20.14-i586-5_slack15.0.txz:  Rebuilt.
  This release fixes 6 recently reported security vulnerabilities in
  various extensions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2022-December/003302.html
    https://www.cve.org/CVERecord?id=CVE-2022-46340
    https://www.cve.org/CVERecord?id=CVE-2022-46341
    https://www.cve.org/CVERecord?id=CVE-2022-46342
    https://www.cve.org/CVERecord?id=CVE-2022-46343
    https://www.cve.org/CVERecord?id=CVE-2022-46344
    https://www.cve.org/CVERecord?id=CVE-2022-4283
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-5_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-5_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-5_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-4_slack15.0.txz:  Rebuilt.
  This release fixes 6 recently reported security vulnerabilities in
  various extensions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2022-December/003302.html
    https://www.cve.org/CVERecord?id=CVE-2022-46340
    https://www.cve.org/CVERecord?id=CVE-2022-46341
    https://www.cve.org/CVERecord?id=CVE-2022-46342
    https://www.cve.org/CVERecord?id=CVE-2022-46343
    https://www.cve.org/CVERecord?id=CVE-2022-46344
    https://www.cve.org/CVERecord?id=CVE-2022-4283
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated packages for Slackware 15.0:

Updated packages for Slackware x86_64 15.0:

Updated packages for Slackware -current:

Updated packages for Slackware x86_64 -current:


MD5 signatures:
+-------------+

Slackware 15.0 packages:
683edb856666fb30bd258b63ad55da6a  xorg-server-1.20.14-i586-5_slack15.0.txz
c1af801184e10c133c4e4e11271af875  xorg-server-xephyr-1.20.14-i586-5_slack15.0.txz
f12a3d9bd6fc6b3e495002148dd9188b  xorg-server-xnest-1.20.14-i586-5_slack15.0.txz
147013bff325b1c402faf848b373af69  xorg-server-xvfb-1.20.14-i586-5_slack15.0.txz
282c242615446a188ddb08174e98dbdd  xorg-server-xwayland-21.1.4-i586-4_slack15.0.txz

Slackware x86_64 15.0 packages:
85edd258b0a6168e27a1eb788416a474  xorg-server-1.20.14-x86_64-5_slack15.0.txz
cd83ffe7f3bd56cacafcedca1124b100  xorg-server-xephyr-1.20.14-x86_64-5_slack15.0.txz
5550bf8261cc2f390b423ea460d8dfbf  xorg-server-xnest-1.20.14-x86_64-5_slack15.0.txz
edd62f971817ee62498d6d90023eb206  xorg-server-xvfb-1.20.14-x86_64-5_slack15.0.txz
fa98db6bfdd4b98c1ff0a55580acedf3  xorg-server-xwayland-21.1.4-x86_64-4_slack15.0.txz

Slackware -current packages:
684d9d7093377190c06c463c4ada231b  x/xorg-server-21.1.5-i586-1.txz
e8d9a103a9a1d70aea8ec7419edaa86b  x/xorg-server-xephyr-21.1.5-i586-1.txz
88331ca556d5eb4c603fe31989d53168  x/xorg-server-xnest-21.1.5-i586-1.txz
2da875f67724fa81df5dd7f79e9273ff  x/xorg-server-xvfb-21.1.5-i586-1.txz
2b3984e3d35f51228aa62c29839108c8  x/xorg-server-xwayland-22.1.6-i586-1.txz

Slackware x86_64 -current packages:
da67fc539345cd7355ab0462105c3f36  x/xorg-server-21.1.5-x86_64-1.txz
8ec888bc8a0ad4ea84b701f801d5d7e0  x/xorg-server-xephyr-21.1.5-x86_64-1.txz
ec94139185208365d81cac6753c4ce98  x/xorg-server-xnest-21.1.5-x86_64-1.txz
fbe444fe8a5e1bf9e5f88cea0518d29e  x/xorg-server-xvfb-21.1.5-x86_64-1.txz
3f7079c80173bf8cd6551ac76cd8367b  x/xorg-server-xwayland-22.1.6-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg xorg-server-*.txz


+-----+

Slackware: 2022-348-03: xorg-server Security Update

December 14, 2022
New xorg-server packages are available for Slackware 15.0 and -current to fix security issues

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/xorg-server-1.20.14-i586-5_slack15.0.txz: Rebuilt. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *) patches/packages/xorg-server-xephyr-1.20.14-i586-5_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xnest-1.20.14-i586-5_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.20.14-i586-5_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xwayland-21.1.4-i586-4_slack15.0.txz: Rebuilt. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated packages for Slackware 15.0:
Updated packages for Slackware x86_64 15.0:
Updated packages for Slackware -current:
Updated packages for Slackware x86_64 -current:

MD5 Signatures

Slackware 15.0 packages: 683edb856666fb30bd258b63ad55da6a xorg-server-1.20.14-i586-5_slack15.0.txz c1af801184e10c133c4e4e11271af875 xorg-server-xephyr-1.20.14-i586-5_slack15.0.txz f12a3d9bd6fc6b3e495002148dd9188b xorg-server-xnest-1.20.14-i586-5_slack15.0.txz 147013bff325b1c402faf848b373af69 xorg-server-xvfb-1.20.14-i586-5_slack15.0.txz 282c242615446a188ddb08174e98dbdd xorg-server-xwayland-21.1.4-i586-4_slack15.0.txz
Slackware x86_64 15.0 packages: 85edd258b0a6168e27a1eb788416a474 xorg-server-1.20.14-x86_64-5_slack15.0.txz cd83ffe7f3bd56cacafcedca1124b100 xorg-server-xephyr-1.20.14-x86_64-5_slack15.0.txz 5550bf8261cc2f390b423ea460d8dfbf xorg-server-xnest-1.20.14-x86_64-5_slack15.0.txz edd62f971817ee62498d6d90023eb206 xorg-server-xvfb-1.20.14-x86_64-5_slack15.0.txz fa98db6bfdd4b98c1ff0a55580acedf3 xorg-server-xwayland-21.1.4-x86_64-4_slack15.0.txz
Slackware -current packages: 684d9d7093377190c06c463c4ada231b x/xorg-server-21.1.5-i586-1.txz e8d9a103a9a1d70aea8ec7419edaa86b x/xorg-server-xephyr-21.1.5-i586-1.txz 88331ca556d5eb4c603fe31989d53168 x/xorg-server-xnest-21.1.5-i586-1.txz 2da875f67724fa81df5dd7f79e9273ff x/xorg-server-xvfb-21.1.5-i586-1.txz 2b3984e3d35f51228aa62c29839108c8 x/xorg-server-xwayland-22.1.6-i586-1.txz
Slackware x86_64 -current packages: da67fc539345cd7355ab0462105c3f36 x/xorg-server-21.1.5-x86_64-1.txz 8ec888bc8a0ad4ea84b701f801d5d7e0 x/xorg-server-xephyr-21.1.5-x86_64-1.txz ec94139185208365d81cac6753c4ce98 x/xorg-server-xnest-21.1.5-x86_64-1.txz fbe444fe8a5e1bf9e5f88cea0518d29e x/xorg-server-xvfb-21.1.5-x86_64-1.txz 3f7079c80173bf8cd6551ac76cd8367b x/xorg-server-xwayland-22.1.6-x86_64-1.txz

Severity
[slackware-security] xorg-server (SSA:2022-348-03)
New xorg-server packages are available for Slackware 15.0 and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the packages as root: # upgradepkg xorg-server-*.txz

Related News