CVE-2025-26595
Xorg: xwayland: buffer overflow in xkbvmodmasktext()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
6th
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
| CWE | CWE-121 |
| Published | Feb 25, 2025 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2500 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2502 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2861 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2862 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2865 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2866 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2873 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2874 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2875 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2879 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2880 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3976 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7163 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7165 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7458 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-26595 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2345257 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html