Fedora Linux 8811 Published by

A xorg-x11-server security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: xorg-x11-server-1.20.14-9.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-9100b7aafd
2022-11-24 01:33:42.487588
--------------------------------------------------------------------------------

Name : xorg-x11-server
Product : Fedora 35
Version : 1.20.14
Release : 9.fc35
URL :   http://www.x.org
Summary : X.Org X11 X server
Description :
X.Org X11 X server

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2022-3550, CVE-2022-3551
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 8 2022 Olivier Fourdan - 1.20.14-9
- Fix CVE-2022-3550, CVE-2022-3551
* Sat Jul 23 2022 Fedora Release Engineering - 1.20.14-8
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2140698 - CVE-2022-3550 xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c
  https://bugzilla.redhat.com/show_bug.cgi?id=2140698
[ 2 ] Bug #2140701 - CVE-2022-3551 xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c
  https://bugzilla.redhat.com/show_bug.cgi?id=2140701
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-9100b7aafd' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________