First published: Wed Feb 12 2025(Updated: )
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Xorg-x11-server-xwayland | ||
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26600 is classified as a high-severity vulnerability due to the potential for use-after-free exploitation.
To remediate CVE-2025-26600, update the affected X.Org and Xwayland packages to their latest versions as specified by your distribution.
CVE-2025-26600 affects specific versions of X.Org Xwayland, including versions prior to the latest security patches.
CVE-2025-26600 specifically impacts X.Org and Xwayland components used on various Linux distributions.
Currently, there are no known workarounds for CVE-2025-26600; updates are recommended to mitigate the vulnerability.