xorg-x11-server-1.20.11-32.el9_6
エラータID: AXSA:2025-11052:08
X.Org X11 X server
CVE-2025-62229
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
CVE-2025-62230
A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
CVE-2025-62231
A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.
Update packages.
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.
N/A
SRPMS
- xorg-x11-server-1.20.11-32.el9_6.src.rpm
MD5: a0b364bad10b9d9a5d4542e35cfe47cd
SHA-256: ef4eecd2f0656860e83f8eaf865983cb665054b1e5679496cff0e299e85f04a7
Size: 6.31 MB
Asianux Server 9 for x86_64
- xorg-x11-server-common-1.20.11-32.el9_6.x86_64.rpm
MD5: 3233b35f80e52e702e430209e87549c1
SHA-256: db4c409b3ef6d12adda9fab1582dffc6c3bae5944348cd02db9a30b1e9724182
Size: 34.29 kB - xorg-x11-server-devel-1.20.11-32.el9_6.i686.rpm
MD5: 8455f5ccfa474c05fce6657160491032
SHA-256: a73f96072e73c0fbccb95e8d70d25236f0d54bea4e86771f93bd9f127b9888d0
Size: 251.92 kB - xorg-x11-server-devel-1.20.11-32.el9_6.x86_64.rpm
MD5: f469d36cec8df68b1f7ffb67e3130153
SHA-256: 14ac482255435f406af50ded14eb6d5fb15dd4f4cad2a6419100a1c53c27c3d7
Size: 251.90 kB - xorg-x11-server-source-1.20.11-32.el9_6.noarch.rpm
MD5: 5244f7b35ec269cfa4ec350c2af032ca
SHA-256: 1c03537ed2d7c02036c3928264a1fe1075099f465f5d987e9b374e54ec9b53ef
Size: 2.37 MB - xorg-x11-server-Xdmx-1.20.11-32.el9_6.x86_64.rpm
MD5: 218fa63028ee149a50d87c7fead93fea
SHA-256: 222e890cc5b314615e76ced5fa566907b4fa053b7f8344dfd0b099e4839087bb
Size: 901.54 kB - xorg-x11-server-Xephyr-1.20.11-32.el9_6.x86_64.rpm
MD5: f205234229bff933a05c2d98c81ee4f1
SHA-256: 68f3e08a6e1a2157579bfd3c2c36ba63db68b81c1f06cab28486d9b75a934431
Size: 1.02 MB - xorg-x11-server-Xnest-1.20.11-32.el9_6.x86_64.rpm
MD5: b7ea5548e9f7ebd50a4c5b42af0c9865
SHA-256: 6eef813b251a43885c81e721f916c28b85312f75c2ee709ec1738a6bb6228739
Size: 718.91 kB - xorg-x11-server-Xorg-1.20.11-32.el9_6.x86_64.rpm
MD5: 039a8a501fc1d1c9040500b30002c8cb
SHA-256: 6bc015f100022cb07baa160085f2e3a8c97af3fff08c97ce1c33fcb1795f76cf
Size: 1.46 MB - xorg-x11-server-Xvfb-1.20.11-32.el9_6.x86_64.rpm
MD5: 92ff6b590231018da3806a48f746fa34
SHA-256: 8f7fb67433df475e58eace1c877d7d9a73a3232d4a80e2cffe267829567cc4b7
Size: 894.91 kB