7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
Low
0.273 Low
EPSS
Percentile
96.8%
New xorg-server packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog:
patches/packages/xorg-server-1.20.14-i586-10_slack15.0.txz: Rebuilt.
This update fixes two security issues:
Out-of-bounds memory write in XKB button actions.
Out-of-bounds memory read in RRChangeOutputProperty and
RRChangeProviderProperty.
For more information, see:
https://lists.x.org/archives/xorg/2023-December/061517.html
https://vulners.com/cve/CVE-2023-6377
https://vulners.com/cve/CVE-2023-6478
(* Security fix )
patches/packages/xorg-server-xephyr-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-9_slack15.0.txz: Rebuilt.
This update fixes two security issues:
Out-of-bounds memory write in XKB button actions.
Out-of-bounds memory read in RRChangeOutputProperty and
RRChangeProviderProperty.
For more information, see:
https://lists.x.org/archives/xorg/2023-December/061517.html
https://vulners.com/cve/CVE-2023-6377
https://vulners.com/cve/CVE-2023-6478
( Security fix *)
Where to find the new packages:
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-1.20.14-i586-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xephyr-1.20.14-i586-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xnest-1.20.14-i586-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xvfb-1.20.14-i586-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/xorg-server-xwayland-21.1.4-i586-9_slack15.0.txz
Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-1.20.14-x86_64-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xephyr-1.20.14-x86_64-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xnest-1.20.14-x86_64-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xvfb-1.20.14-x86_64-10_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/xorg-server-xwayland-21.1.4-x86_64-9_slack15.0.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-21.1.10-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xephyr-21.1.10-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xnest-21.1.10-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xvfb-21.1.10-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xwayland-23.2.3-i586-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-21.1.10-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xephyr-21.1.10-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xnest-21.1.10-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xvfb-21.1.10-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/x/xorg-server-xwayland-23.2.3-x86_64-1.txz
MD5 signatures:
Slackware 15.0 packages:
5065df8537bef75dc7ffde17aa11f46f xorg-server-1.20.14-i586-10_slack15.0.txz
11c84ae8ec6a1d73d61f5ddb96c4067d xorg-server-xephyr-1.20.14-i586-10_slack15.0.txz
0b764f40f2e595eacb196b2488e763e9 xorg-server-xnest-1.20.14-i586-10_slack15.0.txz
7b9183ff3e37d690656b842271594fe8 xorg-server-xvfb-1.20.14-i586-10_slack15.0.txz
8c6c7932e873f338257993f49f927964 xorg-server-xwayland-21.1.4-i586-9_slack15.0.txz
Slackware x86_64 15.0 packages:
da39c16aaafb5ec7d1a6eee65f8d8907 xorg-server-1.20.14-x86_64-10_slack15.0.txz
c580b794181367dc804a933405ef1b6a xorg-server-xephyr-1.20.14-x86_64-10_slack15.0.txz
db09cf6d5b4537841cb853eb4741d32c xorg-server-xnest-1.20.14-x86_64-10_slack15.0.txz
84fba92b3df08bf3a439e411809ccde9 xorg-server-xvfb-1.20.14-x86_64-10_slack15.0.txz
93f52b3bc807038878c247b0f0d919e3 xorg-server-xwayland-21.1.4-x86_64-9_slack15.0.txz
Slackware -current packages:
e9650746a65f118b4781e10786a4874b x/xorg-server-21.1.10-i586-1.txz
f086a4ddbc545608eefa2714e1a1989b x/xorg-server-xephyr-21.1.10-i586-1.txz
b3645e16f3ad489ef967ad12a6ddcfb4 x/xorg-server-xnest-21.1.10-i586-1.txz
6fa25c40cf42830cc87745dc05c5452c x/xorg-server-xvfb-21.1.10-i586-1.txz
d4835717765da3d0164c2d7e153e35ba x/xorg-server-xwayland-23.2.3-i586-1.txz
Slackware x86_64 -current packages:
17293df09996e5f8b21c396208e762ef x/xorg-server-21.1.10-x86_64-1.txz
33fe37ac542d5a84aca927596dcea037 x/xorg-server-xephyr-21.1.10-x86_64-1.txz
651bd878005ed1dd9b97e6459543282d x/xorg-server-xnest-21.1.10-x86_64-1.txz
1bffc1de5d6627a1aca85c6dee6ec917 x/xorg-server-xvfb-21.1.10-x86_64-1.txz
da4941dc6da69b3a0f7b0467127e6301 x/xorg-server-xwayland-23.2.3-x86_64-1.txz
Installation instructions:
Upgrade the packages as root:
> upgradepkg xorg-server-*.txz
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
Low
0.273 Low
EPSS
Percentile
96.8%