ELSA-2024-1785

ELSA-2024-1785 - X.Org server security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2024-04-11

Description


[1.20.4-29]
- Fix regression caused by the fix for CVE-2024-31083

[1.20.4-28]
- CVE fix for: CVE-2024-31080, CVE-2024-31081, CVE-2024-31082 and
CVE-2024-31083
Resolves: https://issues.redhat.com/browse/RHEL-31003
Resolves: https://issues.redhat.com/browse/RHEL-30989
Resolves: https://issues.redhat.com/browse/RHEL-30973
- Add util-linux as a dependency of Xvfb
- Fix compilation error on i686


Related CVEs


CVE-2024-31083
CVE-2024-31081
CVE-2024-31080

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_aarch64_latest
xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_aarch64_optional_latest
xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_aarch64_u9_patch
xorg-x11-server-Xdmx-1.20.4-29.el7_9.aarch64.rpm32d486c3f1e6dfb5afb0b00dcf44fc1a-ol7_aarch64_optional_latest
xorg-x11-server-Xephyr-1.20.4-29.el7_9.aarch64.rpm3692427f8ba672d7687da1672aa65dc1-ol7_aarch64_latest
xorg-x11-server-Xephyr-1.20.4-29.el7_9.aarch64.rpm3692427f8ba672d7687da1672aa65dc1-ol7_aarch64_u9_patch
xorg-x11-server-Xnest-1.20.4-29.el7_9.aarch64.rpmfd28622b6a0607b86ddf637031895ff7-ol7_aarch64_optional_latest
xorg-x11-server-Xorg-1.20.4-29.el7_9.aarch64.rpm8a6a357710b88d1ac086162c0aacd22a-ol7_aarch64_latest
xorg-x11-server-Xorg-1.20.4-29.el7_9.aarch64.rpm8a6a357710b88d1ac086162c0aacd22a-ol7_aarch64_u9_patch
xorg-x11-server-Xvfb-1.20.4-29.el7_9.aarch64.rpm7e239b93454c628db9662cc6f2d86a63-ol7_aarch64_optional_latest
xorg-x11-server-Xwayland-1.20.4-29.el7_9.aarch64.rpm604ad50e99e11ac9d6cac9c47f814f89-ol7_aarch64_optional_latest
xorg-x11-server-common-1.20.4-29.el7_9.aarch64.rpm7c6675d10f3ef5a5c65ad8caef61c18f-ol7_aarch64_latest
xorg-x11-server-common-1.20.4-29.el7_9.aarch64.rpm7c6675d10f3ef5a5c65ad8caef61c18f-ol7_aarch64_u9_patch
xorg-x11-server-devel-1.20.4-29.el7_9.aarch64.rpmea961ec2114e2d83e0af73061d610296-ol7_aarch64_optional_latest
xorg-x11-server-source-1.20.4-29.el7_9.noarch.rpm734376711671741dba59c3cd0699645d-ol7_aarch64_optional_latest
Oracle Linux 7 (x86_64) xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_x86_64_latest
xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_x86_64_optional_latest
xorg-x11-server-1.20.4-29.el7_9.src.rpm6e366226c6d814dd569cb439bd241ff7-ol7_x86_64_u9_patch
xorg-x11-server-Xdmx-1.20.4-29.el7_9.x86_64.rpmc3102a62fa4424f5f60c90925ef98066-ol7_x86_64_optional_latest
xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpmae3f28017a03fb6f4eda06972395402a-ol7_x86_64_latest
xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpmae3f28017a03fb6f4eda06972395402a-ol7_x86_64_u9_patch
xorg-x11-server-Xnest-1.20.4-29.el7_9.x86_64.rpmb3225b010cc3487c0ee35f528b60c1e3-ol7_x86_64_optional_latest
xorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpmf0695c22446211e3f2734424196ece25-ol7_x86_64_latest
xorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpmf0695c22446211e3f2734424196ece25-ol7_x86_64_u9_patch
xorg-x11-server-Xvfb-1.20.4-29.el7_9.x86_64.rpmed53f5fedd1e57e707129dcdf8ccdd05-ol7_x86_64_optional_latest
xorg-x11-server-Xwayland-1.20.4-29.el7_9.x86_64.rpm96b6278d738d89ae2198826e16a6d822-ol7_x86_64_optional_latest
xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpmac99e53b6d8d2c8da09c2cebd0607cfc-ol7_x86_64_latest
xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpmac99e53b6d8d2c8da09c2cebd0607cfc-ol7_x86_64_u9_patch
xorg-x11-server-devel-1.20.4-29.el7_9.i686.rpm3a2c13530bef08da6404d371f297fcc0-ol7_x86_64_optional_latest
xorg-x11-server-devel-1.20.4-29.el7_9.x86_64.rpm48cb1e22aba283a4ce6bb25e043f8acb-ol7_x86_64_optional_latest
xorg-x11-server-source-1.20.4-29.el7_9.noarch.rpm734376711671741dba59c3cd0699645d-ol7_x86_64_optional_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete