diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-02-07 20:48:57 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-02-08 13:30:32 +0100 |
commit | 4b5e1863bb865ca0e78d376a8a76869bf0e023c6 (patch) | |
tree | b254877285f9e476aff39213558093bf7365e937 /patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt | |
parent | ad40d2a62a3d9772ffd95038a73f7e957c39950b (diff) | |
download | current-20230207204857_15.0.tar.gz current-20230207204857_15.0.tar.xz |
Tue Feb 7 20:48:57 UTC 202320230207204857_15.0
patches/packages/openssl-1.1.1t-x86_64-1_slack15.0.txz: Upgraded.
This update fixes security issues:
X.400 address type confusion in X.509 GeneralName.
Timing Oracle in RSA Decryption.
Use-after-free following BIO_new_NDEF.
Double free after calling PEM_read_bio_ex.
For more information, see:
https://www.openssl.org/news/secadv/20230207.txt
https://www.cve.org/CVERecord?id=CVE-2023-0286
https://www.cve.org/CVERecord?id=CVE-2022-4304
https://www.cve.org/CVERecord?id=CVE-2023-0215
https://www.cve.org/CVERecord?id=CVE-2022-4450
(* Security fix *)
patches/packages/openssl-solibs-1.1.1t-x86_64-1_slack15.0.txz: Upgraded.
patches/packages/xorg-server-1.20.14-x86_64-7_slack15.0.txz: Rebuilt.
[PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
Also merged another patch to prevent crashes when using a compositor with
the NVIDIA blob. Thanks to mdinslage, willysr, and Daedra.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0494
(* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txz: Rebuilt.
[PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
Also merged another patch to prevent crashes when using a compositor with
the NVIDIA blob. Thanks to mdinslage, willysr, and Daedra.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0494
(* Security fix *)
Diffstat (limited to 'patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt')
-rw-r--r-- | patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt b/patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt new file mode 100644 index 000000000..44e18f2cf --- /dev/null +++ b/patches/packages/xorg-server-xwayland-21.1.4-x86_64-6_slack15.0.txt @@ -0,0 +1,11 @@ +xorg-server-xwayland: xorg-server-xwayland (X Clients under Wayland) +xorg-server-xwayland: +xorg-server-xwayland: Wayland is a complete window system in itself, but even so, if we're +xorg-server-xwayland: migrating away from X, it makes sense to have a good backwards +xorg-server-xwayland: compatibility story. With a few changes, the Xorg server can be +xorg-server-xwayland: modified to use Wayland input devices for input and forward either the +xorg-server-xwayland: root window or individual top-level windows as wayland surfaces. The +xorg-server-xwayland: server still runs the same 2D driver with the same acceleration code +xorg-server-xwayland: as it does when it runs natively. The main difference is that Wayland +xorg-server-xwayland: handles presentation of the windows instead of KMS. +xorg-server-xwayland: |