Core X11 protocol client library.
Security Fix(es):
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.(CVE-2025-26597)
{
"severity": "High"
}{
"x86_64": [
"libX11-1.8.7-3.oe2403.x86_64.rpm",
"libX11-debuginfo-1.8.7-3.oe2403.x86_64.rpm",
"libX11-debugsource-1.8.7-3.oe2403.x86_64.rpm",
"libX11-devel-1.8.7-3.oe2403.x86_64.rpm"
],
"aarch64": [
"libX11-1.8.7-3.oe2403.aarch64.rpm",
"libX11-debuginfo-1.8.7-3.oe2403.aarch64.rpm",
"libX11-debugsource-1.8.7-3.oe2403.aarch64.rpm",
"libX11-devel-1.8.7-3.oe2403.aarch64.rpm"
],
"noarch": [
"libX11-help-1.8.7-3.oe2403.noarch.rpm"
],
"src": [
"libX11-1.8.7-3.oe2403.src.rpm"
]
}