rpm package
almalinux/xorg-x11-server-Xvfb
pkg:rpm/almalinux/xorg-x11-server-Xvfb
Vulnerabilities (49)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-34003 | Hig | 7.8 | < 1.20.11-33.el9_7 | 1.20.11-33.el9_7 | Apr 23, 2026 | A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the s | |
| CVE-2026-34001 | Hig | 7.8 | < 1.20.11-33.el9_7 | 1.20.11-33.el9_7 | Apr 23, 2026 | A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server cr | |
| CVE-2026-33999 | Hig | 7.8 | < 1.20.11-33.el9_7 | 1.20.11-33.el9_7 | Apr 23, 2026 | A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially | |
| CVE-2025-62230 | Hig | 7.3 | < 1.20.11-27.el8_10 | 1.20.11-27.el8_10 | Oct 30, 2025 | A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a cr | |
| CVE-2025-62229 | Hig | 7.3 | < 1.20.11-27.el8_10 | 1.20.11-27.el8_10 | Oct 30, 2025 | A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentia | |
| CVE-2025-62231 | Hig | 7.3 | < 1.20.11-27.el8_10 | 1.20.11-27.el8_10 | Oct 30, 2025 | A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory | |
| CVE-2025-49180 | Hig | 7.8 | < 1.20.11-31.el9_6 | 1.20.11-31.el9_6 | Jun 17, 2025 | A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate. | |
| CVE-2025-49179 | Hig | 7.3 | < 1.20.11-31.el9_6 | 1.20.11-31.el9_6 | Jun 17, 2025 | A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks. | |
| CVE-2025-49178 | Med | 5.5 | < 1.20.11-31.el9_6 | 1.20.11-31.el9_6 | Jun 17, 2025 | A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service. | |
| CVE-2025-49176 | Hig | 7.3 | < 1.20.11-31.el9_6 | 1.20.11-31.el9_6 | Jun 17, 2025 | A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check. | |
| CVE-2025-49175 | Med | 6.1 | < 1.20.11-31.el9_6 | 1.20.11-31.el9_6 | Jun 17, 2025 | A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash. | |
| CVE-2025-26601 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the func | |
| CVE-2025-26600 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free. | |
| CVE-2025-26599 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, w | |
| CVE-2025-26598 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the lis | |
| CVE-2025-26597 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer | |
| CVE-2025-26596 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow. | |
| CVE-2025-26595 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t | |
| CVE-2025-26594 | Hig | 7.8 | < 1.20.11-28.el9_6 | 1.20.11-28.el9_6 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. | |
| CVE-2024-9632 | Hig | 7.8 | < 1.20.11-25.el8_10 | 1.20.11-25.el8_10 | Oct 30, 2024 | A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh |
- affected < 1.20.11-33.el9_7fixed 1.20.11-33.el9_7
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the s
- affected < 1.20.11-33.el9_7fixed 1.20.11-33.el9_7
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server cr
- affected < 1.20.11-33.el9_7fixed 1.20.11-33.el9_7
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially
- affected < 1.20.11-27.el8_10fixed 1.20.11-27.el8_10
A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a cr
- affected < 1.20.11-27.el8_10fixed 1.20.11-27.el8_10
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentia
- affected < 1.20.11-27.el8_10fixed 1.20.11-27.el8_10
A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory
- affected < 1.20.11-31.el9_6fixed 1.20.11-31.el9_6
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
- affected < 1.20.11-31.el9_6fixed 1.20.11-31.el9_6
A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
- affected < 1.20.11-31.el9_6fixed 1.20.11-31.el9_6
A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.
- affected < 1.20.11-31.el9_6fixed 1.20.11-31.el9_6
A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.
- affected < 1.20.11-31.el9_6fixed 1.20.11-31.el9_6
A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the func
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, w
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the lis
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t
- affected < 1.20.11-28.el9_6fixed 1.20.11-28.el9_6
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
- affected < 1.20.11-25.el8_10fixed 1.20.11-25.el8_10
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh
Page 1 of 3