First published: Wed Feb 12 2025(Updated: )
A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26594 has been classified as a moderate severity use-after-free vulnerability.
To remediate CVE-2025-26594, update the xorg-server and xwayland packages to their latest versions as specified by your distribution.
The affected versions of xorg-server include 2:1.20.11-1+deb11u13, 2:1.20.11-1+deb11u14, 2:21.1.7-3+deb12u8, and 2:21.1.15-3.
The affected versions of xwayland are 2:22.1.9-1 and 2:24.1.5-1.
CVE-2025-26594 impacts the X.Org and Xwayland components, specifically involving a use-after-free issue with the root cursor.