vulnerability

Amazon Linux 2023: CVE-2025-26594: Important priority package update for xorg-x11-server (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 25, 2025
Added
Mar 27, 2025
Modified
Dec 4, 2025

Description

A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.

Solutions

amazon-linux-2023-upgrade-xorg-x11-server-commonamazon-linux-2023-upgrade-xorg-x11-server-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-debugsourceamazon-linux-2023-upgrade-xorg-x11-server-develamazon-linux-2023-upgrade-xorg-x11-server-sourceamazon-linux-2023-upgrade-xorg-x11-server-xephyramazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xnestamazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xorgamazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xvfbamazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xwaylandamazon-linux-2023-upgrade-xorg-x11-server-xwayland-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xwayland-debugsourceamazon-linux-2023-upgrade-xorg-x11-server-xwayland-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.