[ALSA-2024:9093] Moderate: xorg-x11-server-Xwayland security update
Type:
security
Severity:
moderate
Release date:
2024-11-18
Description:
Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 xorg-x11-server-Xwayland-23.2.7-1.el9.aarch64.rpm 55cb55322d9aed1709e75f9ffe88cbca788cdcb051b27fa7dddd7be7b442ac8a
aarch64 xorg-x11-server-Xwayland-devel-23.2.7-1.el9.aarch64.rpm f6e31ff8246b3d620050cc248c5d2834ac3e39755a52253e7d025bedc0045a65
i686 xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm 33c99e9ce748fccb3771c851d2e8e9a254f63b7442a04563116b048efc8ecae5
i686 xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm 548b626999958984b243ce780d5982a4ab22021b900d48b509f332fac96f77b3
ppc64le xorg-x11-server-Xwayland-devel-23.2.7-1.el9.ppc64le.rpm 4a38bb7552b1bbd31c7b863787687a200eaf6d4f3bce50cf0a210343546f6df9
ppc64le xorg-x11-server-Xwayland-23.2.7-1.el9.ppc64le.rpm a5fda187b6727e1949dd8f5ffee925320658da5f885e51660690e8d632110bcd
s390x xorg-x11-server-Xwayland-23.2.7-1.el9.s390x.rpm 9a027fc09be6ddbaeb8fba16abda572ab536edb173734548823e746202534efa
s390x xorg-x11-server-Xwayland-devel-23.2.7-1.el9.s390x.rpm d5e6c9aef66edbffc6049aac2412bf11efccfa31e52af7455ffe7fca5c4f13f9
x86_64 xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm 542d10cc19672bd1fee926fde1d08fcb1280b6990fb264e50fb96a667572ff28
x86_64 xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm fda91951a57ec5318f6606f181be43ed5086f1ae756e03c8067141df2332f8e6
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.