xorg-x11-server-Xwayland-23.2.7-3.el9_6

エラータID: AXSA:2025-10356:01

Release date: 
Tuesday, July 1, 2025 - 19:06
Subject: 
xorg-x11-server-Xwayland-23.2.7-3.el9_6
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

Xwayland is an X server for running X clients under Wayland.

Security Fix(es):

* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9 Release Notes linked from the References section.

CVE-2024-9632
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
CVE-2025-26594
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
CVE-2025-26595
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
CVE-2025-26596
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
CVE-2025-26597
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
CVE-2025-26598
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
CVE-2025-26599
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
CVE-2025-26600
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
CVE-2025-26601
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. xorg-x11-server-Xwayland-23.2.7-3.el9_6.src.rpm
    MD5: ccc952becdc45ada105462df37c80620
    SHA-256: 2edf80919b7a77cd76760e6dc509f816647f07c21ea5793e897ecc5ce094418f
    Size: 1.26 MB

Asianux Server 9 for x86_64
  1. xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm
    MD5: 90f39f58b58dbc0c1bb2d5e8a149abbe
    SHA-256: c69e090917f36b231a2983cceda1399baaba4510e7321d3c724392f89e4438db
    Size: 1.01 MB
  2. xorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm
    MD5: 614eb3e442f735002715041d3ab97ec6
    SHA-256: 7b8961c497da8ed7f9eea31aab09f8b26967d6024a2c93b6e48031b3cc8a32dd
    Size: 0.96 MB
  3. xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm
    MD5: 42a1d8367f396f2d87699efe94a0e2a2
    SHA-256: 8522ca9387ec7f4a21a06c8f8ed37ebf5058dedd7083a4d07bc518744d6dc5ac
    Size: 8.45 kB
  4. xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm
    MD5: 5fb64b1c2e93128a1359cba4ba707275
    SHA-256: 0a827ca9534888ffc92acd7d7ebbc9a9fa7d1b8e1814640cbf499283c585370f
    Size: 8.44 kB