-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2024-01a9916e9e 2024-04-19 21:20:20.798943 --------------------------------------------------------------------------------
Name : xorg-x11-server-Xwayland Product : Fedora 40 Version : 23.2.6 Release : 1.fc40 URL : http://www.x.org Summary : Xwayland Description : Xwayland is an X server for running X clients under Wayland.
-------------------------------------------------------------------------------- Update Information:
xwayland 23.2.6 - CVE fix for CVE-2024-31080, CVE-2024-31081, CVE-2024-31083 -------------------------------------------------------------------------------- ChangeLog:
* Tue Apr 9 2024 Olivier Fourdan ofourdan@redhat.com - 23.2.6-1 - xwayland 23.2.6 - (#2273002) * Wed Apr 3 2024 Jos�� Exp��sito jexposit@redhat.com - 23.2.5-1 - CVE fix for: CVE-2024-31080, CVE-2024-31081, CVE-2024-31082 and CVE-2024-31083 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2271997 - CVE-2024-31080 xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents https://bugzilla.redhat.com/show_bug.cgi?id=2271997 [ 2 ] Bug #2271998 - CVE-2024-31081 xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice https://bugzilla.redhat.com/show_bug.cgi?id=2271998 [ 3 ] Bug #2272000 - CVE-2024-31083 xorg-x11-server: User-after-free in ProcRenderAddGlyphs https://bugzilla.redhat.com/show_bug.cgi?id=2272000 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-01a9916e9e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------