First published: Wed Feb 12 2025(Updated: )
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26597 is classified as a medium-severity vulnerability due to its potential to cause a buffer overflow.
To mitigate CVE-2025-26597, update the affected xorg-server and xwayland packages to their latest versions as specified in the vulnerability description.
CVE-2025-26597 affects xorg-server versions up to 2:21.1.15-3 and xwayland versions up to 2:24.1.5-1.
CVE-2025-26597 is a buffer overflow vulnerability that occurs due to improper handling of the key symbols table in X.Org and Xwayland.
Exploitation of CVE-2025-26597 may allow an attacker to execute arbitrary code, which could potentially be done remotely depending on the deployment scenario.