First published: Wed Feb 12 2025(Updated: )
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Xorg-x11-server-xwayland | ||
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26599 is classified as a medium severity vulnerability due to the potential risk of uninitialized pointer access leading to application crashes.
To fix CVE-2025-26599, update to the latest version of Xwayland where the vulnerability is addressed.
CVE-2025-26599 affects X.Org and Xwayland installations across various Linux distributions.
CVE-2025-26599 is an access to an uninitialized pointer flaw that can lead to resource allocation failures.
As of now, there are no known active exploits for CVE-2025-26599, but it is recommended to apply patches as a precaution.