From unknown Sat Jun 21 05:12:29 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#67047 <67047@debbugs.gnu.org> To: bug#67047 <67047@debbugs.gnu.org> Subject: Status: [PATCH] gnu: xorg-server: Update to 21.1.9. Reply-To: bug#67047 <67047@debbugs.gnu.org> Date: Sat, 21 Jun 2025 12:12:29 +0000 retitle 67047 [PATCH] gnu: xorg-server: Update to 21.1.9. reassign 67047 guix-patches submitter 67047 Kaelyn Takata severity 67047 normal tag 67047 patch thanks From debbugs-submit-bounces@debbugs.gnu.org Fri Nov 10 11:47:31 2023 Received: (at submit) by debbugs.gnu.org; 10 Nov 2023 16:47:31 +0000 Received: from localhost ([127.0.0.1]:50747 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r1UfK-00010E-Rj for submit@debbugs.gnu.org; Fri, 10 Nov 2023 11:47:31 -0500 Received: from lists.gnu.org ([2001:470:142::17]:60790) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r1UfI-0000zz-Ia for submit@debbugs.gnu.org; Fri, 10 Nov 2023 11:47:29 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r1UeV-0007Iw-Be for guix-patches@gnu.org; Fri, 10 Nov 2023 11:46:43 -0500 Received: from mail-40134.protonmail.ch ([185.70.40.134]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r1UeT-0002Y4-7I for guix-patches@gnu.org; Fri, 10 Nov 2023 11:46:39 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1699634787; x=1699893987; bh=+NhcXzKxurBRaDu5xu/qx6a2nhHqFpTAX0fNGHu52co=; h=Date:To:From:Cc:Subject:Message-ID:Feedback-ID:From:To:Cc:Date: Subject:Reply-To:Feedback-ID:Message-ID:BIMI-Selector; b=V3xlA1yOfdqsVNFmjECDpxjPLl5Keir53yb+tqXVZEvQwX0UsIawpz+9TAiho6MjK 6aQoeC/rdnnj0uWY2Fe9mnp6PwqA7W9GCujy/2VuoEBk8LJgL+AtkUiaA3Hmdu+GDE wso0y82YXw+vsGtp7BgmUuUMdOw4qXw/apIyrQ8ZvoZeAUzpFhlfhV1xfNVfw83tAA TRzxGdHlFDBTqqYUKTHIfRk1MKaK15NtjEQmu736TGpmgaeJLjn8H3lACNU9t8JqSw QUzh91lUE/X3zHOwt6N4qYTraEqalBhuCkgMxdlrmOTJqniei/7coG0ZGHc+sNp39m 26qfvizsM2etQ== Date: Fri, 10 Nov 2023 16:46:03 +0000 To: guix-patches@gnu.org From: Kaelyn Takata Subject: [PATCH] gnu: xorg-server: Update to 21.1.9. Message-ID: <80e916fe13f864ec59afe3b8e517dce2bf3b7718.1699634744.git.kaelyn.alexi@protonmail.com> Feedback-ID: 34709329:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Received-SPF: pass client-ip=185.70.40.134; envelope-from=kaelyn.alexi@protonmail.com; helo=mail-40134.protonmail.ch X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: 3.0 (+++) X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Fixes CVE-2023-5367 and CVE-2023-5380. See the X.Org security advisory for more information. * gnu/packages/xorg.scm (xorg-server): Update to 21.1.9. Content analysis details: (3.0 points, 10.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (kaelyn.alexi[at]protonmail.com) -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 1.0 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 2.0 SPOOFED_FREEMAIL No description available. X-Debbugs-Envelope-To: submit Cc: Kaelyn Takata X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -0.0 (/) Fixes CVE-2023-5367 and CVE-2023-5380. See the X.Org security advisory for more information. * gnu/packages/xorg.scm (xorg-server): Update to 21.1.9. Change-Id: I5786210cf1e5de4d603155fbbd076763e7ae3447 --- gnu/packages/xorg.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/xorg.scm b/gnu/packages/xorg.scm index f65ffa7476..b30e5c1f07 100644 --- a/gnu/packages/xorg.scm +++ b/gnu/packages/xorg.scm @@ -5029,7 +5029,7 @@ (define-public libxcvt (define-public xorg-server (package (name "xorg-server") - (version "21.1.4") + (version "21.1.9") (source (origin (method url-fetch) @@ -5037,7 +5037,7 @@ (define-public xorg-server "/xserver/xorg-server-" version ".tar.xz")) (sha256 (base32 - "11y5w6z3rz3i4jyv0wc3scd2jh3bsmcklq0fm7a5invywj7bxi2w")) + "0fjk9ggcrn96blq0bm80739yj23s3gjjjsc0nxk4jk0v07i7nsgz")) (patches (list ;; See: base-commit: bb3ab24a296ffa5273b2e82a02ed057e90c095f3 --=20 2.41.0 From debbugs-submit-bounces@debbugs.gnu.org Mon Nov 27 15:46:50 2023 Received: (at 67047) by debbugs.gnu.org; 27 Nov 2023 20:46:50 +0000 Received: from localhost ([127.0.0.1]:44952 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r7iVG-0000BS-Eh for submit@debbugs.gnu.org; Mon, 27 Nov 2023 15:46:50 -0500 Received: from mail-4316.protonmail.ch ([185.70.43.16]:47087) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r7iVE-0000B5-47 for 67047@debbugs.gnu.org; Mon, 27 Nov 2023 15:46:49 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1701117994; x=1701377194; bh=QUZGWAQU/Zt0a6JgGl9bmqzb6QJUpaWv0aaXPeEeGVw=; h=Date:To:From:Cc:Subject:Message-ID:Feedback-ID:From:To:Cc:Date: Subject:Reply-To:Feedback-ID:Message-ID:BIMI-Selector; b=Fh/+kCuxR5O26vLhRcbYtTZOvXjeqv62R/qGUGCt1Gtvxxg/T9CKyv4G5u/mFIRTj /XIC/ekmY1B1sfy7OHwororYmtQ5ymwvUR+8U1Cw65wbj8NiqwVtfEmV4nUSw39Y9X 7a8kOUkC1XIioh6h9EWm6fB3ZfdIs0oYYyb9Y5WJvlnCf+u8dSfAEUwTz2pZ6zSRkL rXpteUARNbTH89CHAxBuaz/Z4u/HD94jCmhShmI1+Xz/bcDF0426GgrHRk5VwPRY2Z 2YBQdxTds1A0DMhnoFD7dPWuV2Y/2o+8jNoUpzKHSmAVnlpXFmjB8flD+V4u4yc5hP 3+sT1zvLxUpcQ== Date: Mon, 27 Nov 2023 20:46:22 +0000 To: guix-devel From: Kaelyn Subject: Re: [PATCH] gnu: xorg-server: Update to 21.1.9. Message-ID: Feedback-ID: 34709329:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 67047 Cc: "67047@debbugs.gnu.org" <67047@debbugs.gnu.org> X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Hi, I wanted to bring folks' attention to https://issues.guix.gnu.org/67047 whi= ch updates xorg-server, including a number of security fixes. The patch has= been pending for about 17 days now, and while the QA badge reports "failed= " I just spot-checked some of the failures and they seem to be unrelated (e= .g. a lot of builds going from unknown to blocked or vice versa, the one ne= w failure for aarch64 being a large download test in the onionshare package= , etc).=20 Is there anything I can do to help the process along? It may also be worth = noting that "guix refresh -l xorg-server" reports 125 rebuilds. I also chec= ked and the update to xorg-server does not appear to alter the derivation f= or the xorg-server-for-tests (which is still at version 21.1.1). Cheers, Kaelyn From debbugs-submit-bounces@debbugs.gnu.org Tue Nov 28 00:21:41 2023 Received: (at 67047-done) by debbugs.gnu.org; 28 Nov 2023 05:21:41 +0000 Received: from localhost ([127.0.0.1]:45251 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r7qXV-0007SX-2k for submit@debbugs.gnu.org; Tue, 28 Nov 2023 00:21:41 -0500 Received: from mail-40131.protonmail.ch ([185.70.40.131]:51651) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1r7qXT-0007SG-1G for 67047-done@debbugs.gnu.org; Tue, 28 Nov 2023 00:21:39 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1701148885; x=1701408085; bh=228gBFIfPTakDL3P+U8du/pNwA4Z+Pi5tMpMU8XJF8Q=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=XEuYVbmyg3UAOfuoGPF04FLqxM8Kdea0Dz1HenUAgpFI7gsEYSJnfYNKpHG5cKRG7 mgYz1b4pEfZkL4La/8UwIcM8LVSl0r8/jt1ZBXYD25TpzS0DgZSyISicR1iwwqxe+c biycCQepWe562rL6bozM8WITlPrEwEOaqDKxGQn8XXum7o2zNVtCdP8pmAKFS962Ma mctifDPSGuDRzrzT2OtEMf1UFL865cj+5j1rGgy2oDHsdSvyqHaJdUKJ5Hc6wh7Gip rggr86vsALuDvRlAzGOvZPAgqsRXf6wVVb/AHYZOHnRcy8Out/uEZEEDAXGmrGQzNz z725OqYaIuu1A== Date: Tue, 28 Nov 2023 05:21:10 +0000 To: Kaelyn From: John Kehayias Subject: Re: [PATCH] gnu: xorg-server: Update to 21.1.9. Message-ID: <8734wqa1xb.fsf@protonmail.com> In-Reply-To: References: Feedback-ID: 7805494:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 67047-done Cc: guix-devel@gnu.org, 67047-done@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Dear Kaelyn, On Mon, Nov 27, 2023 at 08:46 PM, Kaelyn wrote: > Hi, > > I wanted to bring folks' attention to > which updates xorg-server, including > a number of security fixes. The patch has been pending for about 17 > days now, and while the QA badge reports "failed" I just spot-checked > some of the failures and they seem to be unrelated (e.g. a lot of > builds going from unknown to blocked or vice versa, the one new > failure for aarch64 being a large download test in the onionshare > package, etc). > Thanks for the update. Yes, QA looked good to me too, all things considered. > Is there anything I can do to help the process along? It may also be > worth noting that "guix refresh -l xorg-server" reports 125 rebuilds. > I also checked and the update to xorg-server does not appear to alter > the derivation for the xorg-server-for-tests (which is still at > version 21.1.1). > > Cheers, > Kaelyn No, you did exactly what you needed to. I did see this patch when it came in and was just giving a bit for QA to do the builds. That took longer, I got distracted hoping I could merge mesa-updates first, then hit CI delays...all that is to say I should have communicated I had this on my radar. Sorry about that! I appreciate the patch and the nudge. Pushed as 06e0f638abd36f816a221af4542ca4a850d7af2d with a minor tweak to the commit message to note [security fixes] at the top. I built it locally for x86_64 with mesa-updates merged. Which reminds me to make sure we have a way to flagging security updates just like other teams/tags and get them priority. Now on the security team, it is a first priority. Thanks again! John From unknown Sat Jun 21 05:12:29 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Tue, 26 Dec 2023 12:24:09 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator