[CLSA-2025:1756409662] xorg-x11-server: Fix of 8 CVEs
Type:
security
Severity:
Important
Release date:
2025-08-28 19:34:26 UTC
Description:
- CVE-2025-26594: refuse to free the root cursor and keep its ref - CVE-2025-26595: fix buffer overflow in XkbVModMaskText() - CVE-2025-26596: xkb: fix computation of XkbSizeKeySyms - CVE-2025-26597: xkb: fix buffer overflow in XkbChangeTypesOfKey() - CVE-2025-26598: Xi: Fix barrier device search - CVE-2025-26599: always initialize the border clip in compAllocPixmap() - CVE-2025-26600: dix: Dequeue pending events on frozen device on removal - CVE-2025-26601: postpone actual changes in SyncChangeAlarmAttributes()
Updated packages:
  • xorg-x11-server-Xdmx-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:e2b2d94c451edc59b59993ed61585701695b0e5ed74a4bfed1994098d4ac18fb
  • xorg-x11-server-Xephyr-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:47c103787bed29b8d66eaf6eca956feb585bb14eb7bff9d2c2211c5475834ccd
  • xorg-x11-server-Xnest-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:7a13da999df84812afa47e397f79469b4214f3eba0ed9806efddcdd423182db7
  • xorg-x11-server-Xorg-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:621c679d4d5cc699bf4d761e672b6777043e19d33f0284c88006f06aa4199b63
  • xorg-x11-server-Xvfb-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:686cb27064d332fb5a6d10b31686f13f13969b6f470eb04ef8401d7c9bed8dbb
  • xorg-x11-server-Xwayland-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:d2a561b6abb6ce50bc33915ff6c59b5affbf66a07c0d52f4135367a6e85f2166
  • xorg-x11-server-common-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:783a1da3a430a68f4d324080c2b83b89485a0647700cde3672f23a729a7fd9e0
  • xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els1.i686.rpm
    sha:799310b92fb44573dc8c9447ac02e1733ca0bc27561df20838e9d1b4fba20b55
  • xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm
    sha:fb3493b3042581c2300520c92bdfa9cf774bc761cf5233bbc895e940bc051de1
  • xorg-x11-server-source-1.20.4-99.el7_9.tuxcare.els1.noarch.rpm
    sha:02605bd1e39d8e7c350ba68fe92dc0daf581b9d9f210c4d73754f55583368838
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.