Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-194-01
HistoryJul 13, 2022 - 8:04 p.m.

[slackware-security] xorg-server

2022-07-1320:04:43
Slackware Linux Project
www.slackware.com
11

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.6%

New xorg-server packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/xorg-server-1.20.14-i586-3_slack15.0.txz: Rebuilt.
xkb: switch to array index loops to moving pointers.
xkb: add request length validation for XkbSetGeometry.
xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck.
For more information, see:
https://vulners.com/cve/CVE-2022-2319
https://vulners.com/cve/CVE-2022-2320
(* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-3_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-3_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-3_slack15.0.txz: Rebuilt.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-1.20.14-i586-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xephyr-1.20.14-i586-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xnest-1.20.14-i586-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xvfb-1.20.14-i586-3_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-1.20.14-x86_64-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xephyr-1.20.14-x86_64-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xnest-1.20.14-x86_64-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xvfb-1.20.14-x86_64-3_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-1.20.14-i586-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xephyr-1.20.14-i586-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xnest-1.20.14-i586-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xvfb-1.20.14-i586-4.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-1.20.14-x86_64-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xephyr-1.20.14-x86_64-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xnest-1.20.14-x86_64-4.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xvfb-1.20.14-x86_64-4.txz

MD5 signatures:

Slackware 15.0 packages:
2a39bcbda1fad77c4936a08dcf1caebe xorg-server-1.20.14-i586-3_slack15.0.txz
a277f13d1ea009fcce3e67415c79745f xorg-server-xephyr-1.20.14-i586-3_slack15.0.txz
3e851870eaad3d3492c75117251b946a xorg-server-xnest-1.20.14-i586-3_slack15.0.txz
c3d2cbe293d26ff47e3a3b4fad7b8ff9 xorg-server-xvfb-1.20.14-i586-3_slack15.0.txz

Slackware x86_64 15.0 packages:
4296492ab74754e8b67c9e52bedf76ee xorg-server-1.20.14-x86_64-3_slack15.0.txz
34863946fa50b8fe869a48449c8af236 xorg-server-xephyr-1.20.14-x86_64-3_slack15.0.txz
99deb8444e34a8bb90eb1082ccea8e08 xorg-server-xnest-1.20.14-x86_64-3_slack15.0.txz
550ca7acb5be195712ac66bad373651a xorg-server-xvfb-1.20.14-x86_64-3_slack15.0.txz

Slackware -current packages:
80bd0b4e5849ce53b8b47a8571b00062 x/xorg-server-1.20.14-i586-4.txz
6c479d2f3ee30c017ebda4b4634f63ec x/xorg-server-xephyr-1.20.14-i586-4.txz
bea775722de1898d6f974958700fb64a x/xorg-server-xnest-1.20.14-i586-4.txz
db136a96940eafd5e8dc503cd225d765 x/xorg-server-xvfb-1.20.14-i586-4.txz

Slackware x86_64 -current packages:
55082a6088ec0ed0b0fc49c75ac42562 x/xorg-server-1.20.14-x86_64-4.txz
a21d0968c7f22c653ba2b326e65df42c x/xorg-server-xephyr-1.20.14-x86_64-4.txz
1a1710af2811fddcfa72ab22cf46b2a8 x/xorg-server-xnest-1.20.14-x86_64-4.txz
619d5dd793a7f2dc0ab8de7077d6f6e8 x/xorg-server-xvfb-1.20.14-x86_64-4.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg xorg-server-*.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.6%