vulnerability
Red Hat: CVE-2025-49180: xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Jun 17, 2025 | Jun 26, 2025 | Nov 14, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Jun 17, 2025
Added
Jun 26, 2025
Modified
Nov 14, 2025
Description
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-tigervncredhat-upgrade-tigervnc-debuginforedhat-upgrade-tigervnc-debugsourceredhat-upgrade-tigervnc-iconsredhat-upgrade-tigervnc-licenseredhat-upgrade-tigervnc-selinuxredhat-upgrade-tigervnc-serverredhat-upgrade-tigervnc-server-debuginforedhat-upgrade-tigervnc-server-minimalredhat-upgrade-tigervnc-server-minimal-debuginforedhat-upgrade-tigervnc-server-moduleredhat-upgrade-tigervnc-server-module-debuginforedhat-upgrade-xorg-x11-server-commonredhat-upgrade-xorg-x11-server-debuginforedhat-upgrade-xorg-x11-server-debugsourceredhat-upgrade-xorg-x11-server-develredhat-upgrade-xorg-x11-server-sourceredhat-upgrade-xorg-x11-server-xdmxredhat-upgrade-xorg-x11-server-xdmx-debuginforedhat-upgrade-xorg-x11-server-xephyrredhat-upgrade-xorg-x11-server-xephyr-debuginforedhat-upgrade-xorg-x11-server-xnestredhat-upgrade-xorg-x11-server-xnest-debuginforedhat-upgrade-xorg-x11-server-xorgredhat-upgrade-xorg-x11-server-xorg-debuginforedhat-upgrade-xorg-x11-server-xvfbredhat-upgrade-xorg-x11-server-xvfb-debuginforedhat-upgrade-xorg-x11-server-xwaylandredhat-upgrade-xorg-x11-server-xwayland-debuginforedhat-upgrade-xorg-x11-server-xwayland-debugsourceredhat-upgrade-xorg-x11-server-xwayland-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.