rpm package
suse/libX11&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/libX11&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-26597 | Hig | 7.8 | < 1.6.5-150000.3.36.1 | 1.6.5-150000.3.36.1 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer | |
| CVE-2023-3138 | — | < 1.6.5-150000.3.30.1 | 1.6.5-150000.3.30.1 | Jun 28, 2023 | A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array in |
- affected < 1.6.5-150000.3.36.1fixed 1.6.5-150000.3.36.1
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer
- CVE-2023-3138Jun 28, 2023affected < 1.6.5-150000.3.30.1fixed 1.6.5-150000.3.30.1
A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array in