Security update for xorg-x11-server
Announcement ID: | SUSE-SU-2025:0734-1 |
---|---|
Release Date: | 2025-02-26T14:32:45Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for xorg-x11-server fixes the following issues:
- CVE-2025-26594: Use-after-free of the root cursor (bsc#1237427).
- CVE-2025-26595: Buffer overflow in XkbVModMaskText() (bsc#1237429).
- CVE-2025-26596: Heap overflow in XkbWriteKeySyms() (bsc#1237430).
- CVE-2025-26597: Buffer overflow in XkbChangeTypesOfKey() (bsc#1237431).
- CVE-2025-26598: Out-of-bounds write in CreatePointerBarrierClient() (bsc#1237432).
- CVE-2025-26599: Use of uninitialized pointer in compRedirectWindow() (bsc#1237433).
- CVE-2025-26600: Use-after-free in PlayReleasedEvents() (bsc#1237434).
- CVE-2025-26601: Use-after-free in SyncInitTrigger() (bsc#1237435).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-734=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-734=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- xorg-x11-server-debugsource-1.19.6-10.80.1
- xorg-x11-server-extra-debuginfo-1.19.6-10.80.1
- xorg-x11-server-1.19.6-10.80.1
- xorg-x11-server-debuginfo-1.19.6-10.80.1
- xorg-x11-server-extra-1.19.6-10.80.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- xorg-x11-server-debugsource-1.19.6-10.80.1
- xorg-x11-server-extra-debuginfo-1.19.6-10.80.1
- xorg-x11-server-1.19.6-10.80.1
- xorg-x11-server-debuginfo-1.19.6-10.80.1
- xorg-x11-server-extra-1.19.6-10.80.1
References:
- https://www.suse.com/security/cve/CVE-2025-26594.html
- https://www.suse.com/security/cve/CVE-2025-26595.html
- https://www.suse.com/security/cve/CVE-2025-26596.html
- https://www.suse.com/security/cve/CVE-2025-26597.html
- https://www.suse.com/security/cve/CVE-2025-26598.html
- https://www.suse.com/security/cve/CVE-2025-26599.html
- https://www.suse.com/security/cve/CVE-2025-26600.html
- https://www.suse.com/security/cve/CVE-2025-26601.html
- https://bugzilla.suse.com/show_bug.cgi?id=1237427
- https://bugzilla.suse.com/show_bug.cgi?id=1237429
- https://bugzilla.suse.com/show_bug.cgi?id=1237430
- https://bugzilla.suse.com/show_bug.cgi?id=1237431
- https://bugzilla.suse.com/show_bug.cgi?id=1237432
- https://bugzilla.suse.com/show_bug.cgi?id=1237433
- https://bugzilla.suse.com/show_bug.cgi?id=1237434
- https://bugzilla.suse.com/show_bug.cgi?id=1237435