vulnerability
Amazon Linux 2023: CVE-2025-26597: Important priority package update for xorg-x11-server (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Feb 25, 2025 | Mar 27, 2025 | Dec 4, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 25, 2025
Added
Mar 27, 2025
Modified
Dec 4, 2025
Description
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
Solutions
amazon-linux-2023-upgrade-xorg-x11-server-commonamazon-linux-2023-upgrade-xorg-x11-server-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-debugsourceamazon-linux-2023-upgrade-xorg-x11-server-develamazon-linux-2023-upgrade-xorg-x11-server-sourceamazon-linux-2023-upgrade-xorg-x11-server-xephyramazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xnestamazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xorgamazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xvfbamazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xwaylandamazon-linux-2023-upgrade-xorg-x11-server-xwayland-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xwayland-debugsourceamazon-linux-2023-upgrade-xorg-x11-server-xwayland-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.