A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
13 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 May 2025, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:* |
cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* |
CWE | CWE-787 | |
References | () https://access.redhat.com/errata/RHSA-2025:2500 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2502 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2861 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2862 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2865 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2866 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2873 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2874 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2875 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2879 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2025:2880 - Third Party Advisory |
17 Mar 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Mar 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Mar 2025, 17:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://access.redhat.com/security/cve/CVE-2025-26595 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2345257 - Issue Tracking | |
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:-:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* |
|
First Time |
Redhat enterprise Linux
X.org x Server Tigervnc Redhat X.org X.org xwayland Tigervnc tigervnc |
25 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 16:15
Updated : 2025-05-13 20:15
NVD link : CVE-2025-26595
Mitre link : CVE-2025-26595
CVE.ORG link : CVE-2025-26595
JSON object : View
Products Affected
x.org
- xwayland
- x_server
tigervnc
- tigervnc
redhat
- enterprise_linux