Xorg
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Xorg product.
RSS Feeds for Xorg security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Xorg products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Xorg Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2025 there have been 8 vulnerabilities in Xorg with an average score of 7.8 out of ten. Last year, in 2024 Xorg had 4 security vulnerabilities published. That is, 4 more vulnerabilities have already been reported in 2025 as compared to last year. However, the average CVE base score of the vulnerabilities in 2025 is greater by 0.08.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 8 | 7.80 |
2024 | 4 | 7.73 |
2023 | 13 | 6.98 |
2022 | 6 | 7.53 |
2021 | 8 | 7.95 |
2020 | 8 | 7.38 |
2019 | 1 | 7.80 |
2018 | 5 | 7.84 |
It may take a day or so for new Xorg vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Xorg Security Vulnerabilities
A use-after-free flaw was found in X.Org and Xwayland
CVE-2025-26594
7.8 - High
- February 25, 2025
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
Dangling pointer
A use-after-free flaw was found in X.Org and Xwayland
CVE-2025-26601
7.8 - High
- February 25, 2025
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.
Dangling pointer
A use-after-free flaw was found in X.Org and Xwayland
CVE-2025-26600
7.8 - High
- February 25, 2025
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
Dangling pointer
An access to an uninitialized pointer flaw was found in X.Org and Xwayland
CVE-2025-26599
7.8 - High
- February 25, 2025
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
Access of Uninitialized Pointer
An out-of-bounds write flaw was found in X.Org and Xwayland
CVE-2025-26598
7.8 - High
- February 25, 2025
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
Memory Corruption
A buffer overflow flaw was found in X.Org and Xwayland
CVE-2025-26597
7.8 - High
- February 25, 2025
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
Buffer Overflow
A heap overflow flaw was found in X.Org and Xwayland
CVE-2025-26596
7.8 - High
- February 25, 2025
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
Memory Corruption
A buffer overflow flaw was found in X.Org and Xwayland
CVE-2025-26595
7.8 - High
- February 25, 2025
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
Memory Corruption
An out-of-bounds memory access flaw was found in the X.Org server
CVE-2024-0229
7.8 - High
- February 09, 2024
An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
Memory Corruption
A flaw was found in the X.Org server
CVE-2024-0409
7.8 - High
- January 18, 2024
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
Memory Corruption
A flaw was found in the X.Org server
CVE-2024-0408
5.5 - Medium
- January 18, 2024
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
A flaw was found in X.Org server
CVE-2023-6816
9.8 - Critical
- January 18, 2024
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Memory Corruption
A use-after-free flaw was found in xorg-x11-server-Xvfb
CVE-2023-5574
7 - High
- October 25, 2023
A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.
Dangling pointer
A use-after-free flaw was found in the xorg-x11-server
CVE-2023-5380
4.7 - Medium
- October 25, 2023
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
Dangling pointer
A out-of-bounds write flaw was found in the xorg-x11-server
CVE-2023-5367
7.8 - High
- October 25, 2023
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
Memory Corruption
A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function
CVE-2023-43785
5.5 - Medium
- October 10, 2023
A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.
Out-of-bounds Read
A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function
CVE-2023-43787
7.8 - High
- October 10, 2023
A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
Integer Overflow or Wraparound
A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function
CVE-2023-43786
5.5 - Medium
- October 10, 2023
A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
Infinite Loop
A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function
CVE-2023-43788
5.5 - Medium
- October 10, 2023
A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.
Out-of-bounds Read
A vulnerability was found in libX11
CVE-2023-3138
7.5 - High
- June 28, 2023
A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
Memory Corruption
A flaw was found in X.Org Server Overlay Window
CVE-2023-1393
7.8 - High
- March 30, 2023
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
Dangling pointer
A vulnerability was found in X.Org
CVE-2023-0494
7.8 - High
- March 27, 2023
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Dangling pointer
A flaw was found in libXpm
CVE-2022-4883
8.8 - High
- February 07, 2023
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
Untrusted Path
A flaw was found in libXpm
CVE-2022-46285
7.5 - High
- February 07, 2023
A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.
A flaw was found in libXpm
CVE-2022-44617
7.5 - High
- February 06, 2023
A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
Infinite Loop
A vulnerability was found in X.Org
CVE-2022-4283
7.8 - High
- December 14, 2022
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
Dangling pointer
A vulnerability, which was classified as problematic, was found in X.org Server
CVE-2022-3553
6.5 - Medium
- October 17, 2022
A vulnerability, which was classified as problematic, was found in X.org Server. This affects an unknown part of the file hw/xquartz/X11Controller.m of the component xquartz. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier VDB-211053 was assigned to this vulnerability.
Improper Resource Shutdown or Release
A vulnerability, which was classified as problematic, has been found in X.org Server
CVE-2022-3551
6.5 - Medium
- October 17, 2022
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
Improper Resource Shutdown or Release
A vulnerability classified as critical was found in X.org Server
CVE-2022-3550
8.8 - High
- October 17, 2022
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
Buffer Overflow
A flaw was found in the Xorg-x11-server
CVE-2022-2320
7.8 - High
- September 01, 2022
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
Memory Corruption
A flaw was found in the Xorg-x11-server
CVE-2022-2319
7.8 - High
- September 01, 2022
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
Improper Protection for Out of Bounds Signal Level Alerts
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14
CVE-2021-4011
7.8 - High
- December 17, 2021
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14
CVE-2021-4010
7.8 - High
- December 17, 2021
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14
CVE-2021-4009
7.8 - High
- December 17, 2021
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14
CVE-2021-4008
7.8 - High
- December 17, 2021
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code
CVE-2021-31535
9.8 - Critical
- May 27, 2021
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
Classic Buffer Overflow
A privilege escalation flaw was found in the Xorg-x11-server due to a lack of authentication for X11 clients
CVE-2020-25697
7 - High
- May 26, 2021
A privilege escalation flaw was found in the Xorg-x11-server due to a lack of authentication for X11 clients. This flaw allows an attacker to take control of an X application by impersonating the server it is expecting to connect to.
Missing Authentication for Critical Function
A flaw was found in xorg-x11-server in versions before 1.20.11
CVE-2021-3472
7.8 - High
- April 26, 2021
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Integer underflow
A flaw was found in the X.Org Server before version 1.20.10
CVE-2020-14360
7.8 - High
- January 20, 2021
A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
A flaw was found in xorg-x11-server before 1.20.10
CVE-2020-25712
7.8 - High
- December 15, 2020
A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Heap-based Buffer Overflow
A flaw was found in xorg-x11-server before 1.20.9
CVE-2020-14346
7.8 - High
- September 15, 2020
A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Integer underflow
A flaw was found in X.Org Server before xorg-x11-server 1.20.9
CVE-2020-14361
7.8 - High
- September 15, 2020
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Integer underflow
A flaw was found in X.Org Server before xorg-x11-server 1.20.9
CVE-2020-14362
7.8 - High
- September 15, 2020
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Integer underflow
A flaw was found in X.Org Server before xorg-x11-server 1.20.9
CVE-2020-14345
7.8 - High
- September 15, 2020
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Buffer Overflow
An integer overflow vulnerability leading to a double-free was found in libX11
CVE-2020-14363
7.8 - High
- September 11, 2020
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
Integer Overflow or Wraparound
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10
CVE-2020-14344
6.7 - Medium
- August 05, 2020
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
Integer Overflow or Wraparound
A flaw was found in the way xserver memory was not properly initialized
CVE-2020-14347
5.5 - Medium
- August 05, 2020
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
Improper Initialization
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap
CVE-2019-17624
7.8 - High
- October 16, 2019
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
Memory Corruption
A flaw was found in xorg-x11-server before 1.20.3
CVE-2018-14665
6.6 - Medium
- October 25, 2018
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
AuthZ
An issue was discovered in libX11 through 1.6.5
CVE-2018-14600
9.8 - Critical
- August 24, 2018
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
Memory Corruption