A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2025:2500 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2502 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2861 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2862 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2865 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2866 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2873 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2874 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2875 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2879 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2025:2880 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2025-26597 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2345255 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
10 Apr 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2025:2500 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2502 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2861 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2862 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2865 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2866 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2873 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2874 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2875 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2879 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2880 - Third Party Advisory |
21 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
17 Mar 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Mar 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Mar 2025, 17:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 | |
First Time |
Redhat enterprise Linux
Tigervnc tigervnc Tigervnc X.org Redhat X.org x Server X.org xwayland |
|
CPE | cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://access.redhat.com/security/cve/CVE-2025-26597 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2345255 - Issue Tracking |
25 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 16:15
Updated : 2025-04-10 18:13
NVD link : CVE-2025-26597
Mitre link : CVE-2025-26597
CVE.ORG link : CVE-2025-26597
JSON object : View
Products Affected
x.org
- xwayland
- x_server
tigervnc
- tigervnc
redhat
- enterprise_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer