rpm package
opensuse/xwayland&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/xwayland&distro=openSUSE%20Tumbleweed
Vulnerabilities (52)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-26595 | Hig | 7.8 | < 24.1.5-2.1 | 24.1.5-2.1 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t | |
| CVE-2025-26594 | Hig | 7.8 | < 24.1.5-2.1 | 24.1.5-2.1 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. | |
| CVE-2024-9632 | Hig | 7.8 | < 24.1.4-1.1 | 24.1.4-1.1 | Oct 30, 2024 | A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh | |
| CVE-2024-31083 | Hig | 7.8 | < 23.2.5-1.1 | 23.2.5-1.1 | Apr 5, 2024 | A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g | |
| CVE-2024-31081 | Hig | 7.3 | < 23.2.5-1.1 | 23.2.5-1.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c | |
| CVE-2024-31080 | Hig | 7.3 | < 23.2.5-1.1 | 23.2.5-1.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c | |
| CVE-2024-21886 | Hig | 7.8 | < 23.2.4-1.1 | 23.2.4-1.1 | Feb 28, 2024 | A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments. | |
| CVE-2024-21885 | Hig | 7.8 | < 23.2.4-1.1 | 23.2.4-1.1 | Feb 28, 2024 | A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an applicat | |
| CVE-2024-0229 | — | < 23.2.4-1.1 | 23.2.4-1.1 | Feb 9, 2024 | An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended | ||
| CVE-2024-0409 | — | < 23.2.4-1.1 | 23.2.4-1.1 | Jan 18, 2024 | A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context. | ||
| CVE-2024-0408 | — | < 23.2.4-1.1 | 23.2.4-1.1 | Jan 18, 2024 | A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access t | ||
| CVE-2023-6816 | — | < 23.2.4-1.1 | 23.2.4-1.1 | Jan 18, 2024 | A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number o | ||
| CVE-2023-6478 | — | < 23.2.2-3.1 | 23.2.2-3.1 | Dec 13, 2023 | A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information. | ||
| CVE-2023-6377 | — | < 23.2.2-3.1 | 23.2.2-3.1 | Dec 13, 2023 | A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is inv | ||
| CVE-2023-5574 | — | < 23.2.2-2.1 | 23.2.2-2.1 | Oct 25, 2023 | A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-f | ||
| CVE-2023-5380 | — | < 23.2.2-1.1 | 23.2.2-1.1 | Oct 25, 2023 | A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root | ||
| CVE-2023-5367 | — | < 23.2.2-1.1 | 23.2.2-1.1 | Oct 25, 2023 | A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrprope | ||
| CVE-2023-1393 | — | < 23.1.1-1.1 | 23.1.1-1.1 | Mar 30, 2023 | A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will tri | ||
| CVE-2023-0494 | — | < 22.1.8-1.1 | 22.1.8-1.1 | Mar 27, 2023 | A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where th | ||
| CVE-2022-46344 | — | < 22.1.5-2.1 | 22.1.5-2.1 | Dec 14, 2022 | A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on sy |
- affected < 24.1.5-2.1fixed 24.1.5-2.1
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t
- affected < 24.1.5-2.1fixed 24.1.5-2.1
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
- affected < 24.1.4-1.1fixed 24.1.4-1.1
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh
- affected < 23.2.5-1.1fixed 23.2.5-1.1
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g
- affected < 23.2.5-1.1fixed 23.2.5-1.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c
- affected < 23.2.5-1.1fixed 23.2.5-1.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c
- affected < 23.2.4-1.1fixed 23.2.4-1.1
A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
- affected < 23.2.4-1.1fixed 23.2.4-1.1
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an applicat
- CVE-2024-0229Feb 9, 2024affected < 23.2.4-1.1fixed 23.2.4-1.1
An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended
- CVE-2024-0409Jan 18, 2024affected < 23.2.4-1.1fixed 23.2.4-1.1
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
- CVE-2024-0408Jan 18, 2024affected < 23.2.4-1.1fixed 23.2.4-1.1
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access t
- CVE-2023-6816Jan 18, 2024affected < 23.2.4-1.1fixed 23.2.4-1.1
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number o
- CVE-2023-6478Dec 13, 2023affected < 23.2.2-3.1fixed 23.2.2-3.1
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
- CVE-2023-6377Dec 13, 2023affected < 23.2.2-3.1fixed 23.2.2-3.1
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is inv
- CVE-2023-5574Oct 25, 2023affected < 23.2.2-2.1fixed 23.2.2-2.1
A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-f
- CVE-2023-5380Oct 25, 2023affected < 23.2.2-1.1fixed 23.2.2-1.1
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root
- CVE-2023-5367Oct 25, 2023affected < 23.2.2-1.1fixed 23.2.2-1.1
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrprope
- CVE-2023-1393Mar 30, 2023affected < 23.1.1-1.1fixed 23.1.1-1.1
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will tri
- CVE-2023-0494Mar 27, 2023affected < 22.1.8-1.1fixed 22.1.8-1.1
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where th
- CVE-2022-46344Dec 14, 2022affected < 22.1.5-2.1fixed 22.1.5-2.1
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on sy
Page 2 of 3