rpm package
suse/xorg-x11-server&distro=SUSE Linux Enterprise Server 15 SP3-LTSS
pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
Vulnerabilities (35)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-62230 | Hig | 7.3 | < 1.20.3-150200.22.5.118.1 | 1.20.3-150200.22.5.118.1 | Oct 30, 2025 | A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a cr | |
| CVE-2025-62229 | Hig | 7.3 | < 1.20.3-150200.22.5.118.1 | 1.20.3-150200.22.5.118.1 | Oct 30, 2025 | A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentia | |
| CVE-2025-62231 | Hig | 7.3 | < 1.20.3-150200.22.5.118.1 | 1.20.3-150200.22.5.118.1 | Oct 30, 2025 | A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory | |
| CVE-2025-49180 | Hig | 7.8 | < 1.20.3-150200.22.5.105.1 | 1.20.3-150200.22.5.105.1 | Jun 17, 2025 | A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate. | |
| CVE-2025-49179 | Hig | 7.3 | < 1.20.3-150200.22.5.105.1 | 1.20.3-150200.22.5.105.1 | Jun 17, 2025 | A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks. | |
| CVE-2025-49178 | Med | 5.5 | < 1.20.3-150200.22.5.105.1 | 1.20.3-150200.22.5.105.1 | Jun 17, 2025 | A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service. | |
| CVE-2025-49176 | Hig | 7.3 | < 1.20.3-150200.22.5.105.1 | 1.20.3-150200.22.5.105.1 | Jun 17, 2025 | A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check. | |
| CVE-2025-49175 | Med | 6.1 | < 1.20.3-150200.22.5.105.1 | 1.20.3-150200.22.5.105.1 | Jun 17, 2025 | A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash. | |
| CVE-2025-26601 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the func | |
| CVE-2025-26600 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free. | |
| CVE-2025-26599 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, w | |
| CVE-2025-26598 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the lis | |
| CVE-2025-26597 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer | |
| CVE-2025-26596 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow. | |
| CVE-2025-26595 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t | |
| CVE-2025-26594 | Hig | 7.8 | < 1.20.3-150200.22.5.102.1 | 1.20.3-150200.22.5.102.1 | Feb 25, 2025 | A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. | |
| CVE-2024-9632 | Hig | 7.8 | < 1.20.3-150200.22.5.99.1 | 1.20.3-150200.22.5.99.1 | Oct 30, 2024 | A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh | |
| CVE-2024-31083 | Hig | 7.8 | < 1.20.3-150200.22.5.96.1 | 1.20.3-150200.22.5.96.1 | Apr 5, 2024 | A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g | |
| CVE-2024-31082 | Hig | 7.3 | < 1.20.3-150200.22.5.96.1 | 1.20.3-150200.22.5.96.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a | |
| CVE-2024-31081 | Hig | 7.3 | < 1.20.3-150200.22.5.96.1 | 1.20.3-150200.22.5.96.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c |
- affected < 1.20.3-150200.22.5.118.1fixed 1.20.3-150200.22.5.118.1
A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a cr
- affected < 1.20.3-150200.22.5.118.1fixed 1.20.3-150200.22.5.118.1
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentia
- affected < 1.20.3-150200.22.5.118.1fixed 1.20.3-150200.22.5.118.1
A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory
- affected < 1.20.3-150200.22.5.105.1fixed 1.20.3-150200.22.5.105.1
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
- affected < 1.20.3-150200.22.5.105.1fixed 1.20.3-150200.22.5.105.1
A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
- affected < 1.20.3-150200.22.5.105.1fixed 1.20.3-150200.22.5.105.1
A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.
- affected < 1.20.3-150200.22.5.105.1fixed 1.20.3-150200.22.5.105.1
A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.
- affected < 1.20.3-150200.22.5.105.1fixed 1.20.3-150200.22.5.105.1
A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the func
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, w
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the lis
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of t
- affected < 1.20.3-150200.22.5.102.1fixed 1.20.3-150200.22.5.102.1
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
- affected < 1.20.3-150200.22.5.99.1fixed 1.20.3-150200.22.5.99.1
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions wh
- affected < 1.20.3-150200.22.5.96.1fixed 1.20.3-150200.22.5.96.1
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g
- affected < 1.20.3-150200.22.5.96.1fixed 1.20.3-150200.22.5.96.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a
- affected < 1.20.3-150200.22.5.96.1fixed 1.20.3-150200.22.5.96.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c
Page 1 of 2