First published: Wed Feb 12 2025(Updated: )
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26595 is classified as a high-severity vulnerability due to the potential for remote code execution resulting from the buffer overflow.
To mitigate CVE-2025-26595, update to the latest patched versions of xorg-server or xwayland as specified in the vulnerability details.
CVE-2025-26595 affects systems running vulnerable versions of xorg-server and xwayland on Debian distributions.
Yes, CVE-2025-26595 can be remotely exploitable if an attacker can send crafted input to the affected service.
The potential impacts of CVE-2025-26595 include system crashes, unauthorized access, and execution of arbitrary code.