vulnerability
Rocky Linux: CVE-2025-26596: xorg-x11-server-Xwayland (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Feb 25, 2025 | May 8, 2025 | Oct 9, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 25, 2025
Added
May 8, 2025
Modified
Oct 9, 2025
Description
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
Solutions
rocky-upgrade-tigervncrocky-upgrade-tigervnc-debuginforocky-upgrade-tigervnc-debugsourcerocky-upgrade-tigervnc-serverrocky-upgrade-tigervnc-server-debuginforocky-upgrade-tigervnc-server-minimalrocky-upgrade-tigervnc-server-minimal-debuginforocky-upgrade-tigervnc-server-modulerocky-upgrade-tigervnc-server-module-debuginforocky-upgrade-xorg-x11-server-commonrocky-upgrade-xorg-x11-server-develrocky-upgrade-xorg-x11-server-xdmxrocky-upgrade-xorg-x11-server-xdmx-debuginforocky-upgrade-xorg-x11-server-xephyrrocky-upgrade-xorg-x11-server-xephyr-debuginforocky-upgrade-xorg-x11-server-xnestrocky-upgrade-xorg-x11-server-xnest-debuginforocky-upgrade-xorg-x11-server-xorgrocky-upgrade-xorg-x11-server-xorg-debuginforocky-upgrade-xorg-x11-server-xvfbrocky-upgrade-xorg-x11-server-xvfb-debuginforocky-upgrade-xorg-x11-server-xwaylandrocky-upgrade-xorg-x11-server-xwayland-debuginforocky-upgrade-xorg-x11-server-xwayland-debugsourcerocky-upgrade-xorg-x11-server-xwayland-devel
References
- CVE-2025-26596
- https://attackerkb.com/topics/CVE-2025-26596
- CWE-787
- URL-https://errata.rockylinux.org/RLSA-2025:2500
- URL-https://errata.rockylinux.org/RLSA-2025:2502
- URL-https://errata.rockylinux.org/RLSA-2025:7163
- URL-https://errata.rockylinux.org/RLSA-2025:7165
- URL-https://errata.rockylinux.org/RLSA-2025:7458
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.