CVE-2025-26598
Xorg: xwayland: out-of-bounds write in createpointerbarrierclient()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
6th
An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
| CWE | CWE-787 |
| Published | Feb 25, 2025 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2500 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2502 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2861 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2862 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2865 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2866 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2873 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2874 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2875 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2879 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2880 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3976 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7163 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7165 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7458 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-26598 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2345254 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html