summaryrefslogtreecommitdiffstats
path: root/patches/source/xorg-server/patch/xorg-server.patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-12-19 21:18:22 +0000
committer Eric Hameleers <alien@slackware.com>2022-12-20 13:30:29 +0100
commit15705ea3bcf94a6ac99e92ef8fc782b136e71e4f (patch)
treeb63efbee18ba39144e7a4aafb0be14de1c5116d5 /patches/source/xorg-server/patch/xorg-server.patch
parent3c02d6f8a110df5d7d8cf042fb9b09711284fec9 (diff)
downloadcurrent-15705ea3bcf94a6ac99e92ef8fc782b136e71e4f.tar.gz
current-15705ea3bcf94a6ac99e92ef8fc782b136e71e4f.tar.xz
Mon Dec 19 21:18:22 UTC 202220221219211822_15.0
patches/packages/xorg-server-1.20.14-x86_64-6_slack15.0.txz: Rebuilt. This release fixes an invalid event type mask in XTestSwapFakeInput which was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix for CVE-2022-46340. patches/packages/xorg-server-xephyr-1.20.14-x86_64-6_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xnest-1.20.14-x86_64-6_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.20.14-x86_64-6_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xwayland-21.1.4-x86_64-5_slack15.0.txz: Rebuilt. This release fixes an invalid event type mask in XTestSwapFakeInput which was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix for CVE-2022-46340.
Diffstat (limited to 'patches/source/xorg-server/patch/xorg-server.patch')
-rw-r--r--patches/source/xorg-server/patch/xorg-server.patch3
1 files changed, 3 insertions, 0 deletions
diff --git a/patches/source/xorg-server/patch/xorg-server.patch b/patches/source/xorg-server/patch/xorg-server.patch
index 78dbc965a..bd20a0714 100644
--- a/patches/source/xorg-server/patch/xorg-server.patch
+++ b/patches/source/xorg-server/patch/xorg-server.patch
@@ -46,3 +46,6 @@ zcat $CWD/patch/xorg-server/CVE-2022-46341.patch.gz | patch -p1 --verbose || { t
zcat $CWD/patch/xorg-server/CVE-2022-46342.patch.gz | patch -p1 --verbose || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
zcat $CWD/patch/xorg-server/CVE-2022-46343.patch.gz | patch -p1 --verbose || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
zcat $CWD/patch/xorg-server/CVE-2022-46344.patch.gz | patch -p1 --verbose || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
+
+# Fix a bug in the previous patch:
+zcat $CWD/patch/xorg-server/CVE-2022-46340.correction.patch.gz | patch -p1 --verbose || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }