diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-12-13 22:01:34 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-12-14 13:39:45 +0100 |
commit | 823a8c2cb79520c3c7692bbf4a4be64989a047e2 (patch) | |
tree | 85207710541bfb18b627bfaf01d36fd29607835d /recompress.sh | |
parent | 653fd727bd247d30a7a3373be4825532b9838351 (diff) | |
download | current-823a8c2cb79520c3c7692bbf4a4be64989a047e2.tar.gz current-823a8c2cb79520c3c7692bbf4a4be64989a047e2.tar.xz |
Wed Dec 13 22:01:34 UTC 202320231213220134_15.0
patches/packages/libxml2-2.12.3-x86_64-1_slack15.0.txz: Upgraded.
This update addresses regressions when building against libxml2 that were
due to header file refactoring.
patches/packages/xorg-server-1.20.14-x86_64-10_slack15.0.txz: Rebuilt.
This update fixes two security issues:
Out-of-bounds memory write in XKB button actions.
Out-of-bounds memory read in RRChangeOutputProperty and
RRChangeProviderProperty.
For more information, see:
https://lists.x.org/archives/xorg/2023-December/061517.html
https://www.cve.org/CVERecord?id=CVE-2023-6377
https://www.cve.org/CVERecord?id=CVE-2023-6478
(* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-9_slack15.0.txz: Rebuilt.
This update fixes two security issues:
Out-of-bounds memory write in XKB button actions.
Out-of-bounds memory read in RRChangeOutputProperty and
RRChangeProviderProperty.
For more information, see:
https://lists.x.org/archives/xorg/2023-December/061517.html
https://www.cve.org/CVERecord?id=CVE-2023-6377
https://www.cve.org/CVERecord?id=CVE-2023-6478
(* Security fix *)
Diffstat (limited to '')
-rwxr-xr-x | recompress.sh | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh index 8e4aef9bc..601fba1a2 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1201,6 +1201,8 @@ gzip ./patches/source/texlive/texlive.unicode5.0.diff gzip ./patches/source/sysstat/doinst.sh gzip ./patches/source/xorg-server-xwayland/CVE-2022-46342.patch gzip ./patches/source/xorg-server-xwayland/CVE-2022-46343.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2023-6377.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2023-6478.patch gzip ./patches/source/xorg-server-xwayland/CVE-2022-46340.patch gzip ./patches/source/xorg-server-xwayland/CVE-2023-0494.patch gzip ./patches/source/xorg-server-xwayland/CVE-2022-46340.correction.patch @@ -1261,6 +1263,8 @@ gzip ./patches/source/emacs/doinst.sh gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46342.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2023-5380.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46343.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2023-6377.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2023-6478.patch gzip ./patches/source/xorg-server/patch/xorg-server/xorg-server.combo.mouse.keyboard.layout.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-3553.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46340.patch |