vulnerability

Red Hat: CVE-2025-26597: xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 25, 2025
Added
Mar 11, 2025
Modified
Jan 28, 2026

Description

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-tigervncredhat-upgrade-tigervnc-debuginforedhat-upgrade-tigervnc-debugsourceredhat-upgrade-tigervnc-iconsredhat-upgrade-tigervnc-licenseredhat-upgrade-tigervnc-selinuxredhat-upgrade-tigervnc-serverredhat-upgrade-tigervnc-server-debuginforedhat-upgrade-tigervnc-server-minimalredhat-upgrade-tigervnc-server-minimal-debuginforedhat-upgrade-tigervnc-server-moduleredhat-upgrade-tigervnc-server-module-debuginforedhat-upgrade-xorg-x11-server-commonredhat-upgrade-xorg-x11-server-debuginforedhat-upgrade-xorg-x11-server-debugsourceredhat-upgrade-xorg-x11-server-develredhat-upgrade-xorg-x11-server-sourceredhat-upgrade-xorg-x11-server-xdmxredhat-upgrade-xorg-x11-server-xdmx-debuginforedhat-upgrade-xorg-x11-server-xephyrredhat-upgrade-xorg-x11-server-xephyr-debuginforedhat-upgrade-xorg-x11-server-xnestredhat-upgrade-xorg-x11-server-xnest-debuginforedhat-upgrade-xorg-x11-server-xorgredhat-upgrade-xorg-x11-server-xorg-debuginforedhat-upgrade-xorg-x11-server-xvfbredhat-upgrade-xorg-x11-server-xvfb-debuginforedhat-upgrade-xorg-x11-server-xwaylandredhat-upgrade-xorg-x11-server-xwayland-debuginforedhat-upgrade-xorg-x11-server-xwayland-debugsourceredhat-upgrade-xorg-x11-server-xwayland-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.