First published: Wed Feb 12 2025(Updated: )
A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.11-1+deb11u13<=2:21.1.7-3+deb12u8<=2:21.1.15-3 | 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 |
debian/xwayland | <=2:22.1.9-1<=2:24.1.5-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26601 is rated as high severity due to the potential for exploitation of the use-after-free flaw.
To address CVE-2025-26601, update the xorg-server and xwayland packages to the latest versions provided in your distribution.
CVE-2025-26601 affects the xorg-server and xwayland packages on Debian systems.
Yes, the use-after-free flaw in CVE-2025-26601 could potentially allow an attacker to execute arbitrary code.
Currently, no specific temporary workaround for CVE-2025-26601 is recommended besides applying the software updates promptly.