First published: Wed Feb 12 2025(Updated: )
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26598 has been classified as a high-severity vulnerability due to its potential for causing out-of-bounds write errors.
To fix CVE-2025-26598, update the xorg-server and xwayland packages to the latest secure versions provided by your distribution.
CVE-2025-26598 affects the xorg-server and xwayland packages in specific versions as noted by the vulnerability report.
Exploitation of CVE-2025-26598 could lead to potential system crashes or unauthorized access due to memory corruption.
As of now, there are no publicly disclosed exploits for CVE-2025-26598, but it remains a significant security concern.