๐Ÿ” CVE Alert

CVE-2025-26597

HIGH 7.8

Xorg: xwayland: buffer overflow in xkbchangetypesofkey()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
6th

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

CWE CWE-119
Published Feb 25, 2025
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2500 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2502 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2861 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2862 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2865 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2866 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2873 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2874 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2875 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2879 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2880 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3976 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7163 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7165 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7458 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-26597 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2345255 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html