Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-26597

Опубликовано: 25 фев. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

Отчет

Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity and are not affected by this bug.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tigervncAffected
Red Hat Enterprise Linux 6xorg-x11-serverOut of support scope
Red Hat Enterprise Linux 8xorg-x11-serverNot affected
Red Hat Enterprise Linux 8xorg-x11-server-XwaylandNot affected
Red Hat Enterprise Linux 10xorg-x11-server-XwaylandFixedRHSA-2025:745813.05.2025
Red Hat Enterprise Linux 7 Extended Lifecycle SupporttigervncFixedRHSA-2025:286117.03.2025
Red Hat Enterprise Linux 7 Extended Lifecycle Supportxorg-x11-serverFixedRHSA-2025:287917.03.2025
Red Hat Enterprise Linux 8tigervncFixedRHSA-2025:250210.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupporttigervncFixedRHSA-2025:286617.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupporttigervncFixedRHSA-2025:286517.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2345255xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey()

EPSS

Процентиль: 11%
0.0004
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
5 месяцев назад

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

CVSS3: 7.8
nvd
5 месяцев назад

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

CVSS3: 7.8
msrc
4 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
5 месяцев назад

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ...

suse-cvrf
5 месяцев назад

Security update for libX11

EPSS

Процентиль: 11%
0.0004
Низкий

7.8 High

CVSS3