CVE-2025-26599
Xorg: xwayland: use of uninitialized pointer in compredirectwindow()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
6th
An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
| CWE | CWE-824 |
| Published | Feb 25, 2025 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2500 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2502 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2861 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2862 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2865 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2866 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2873 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2874 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2875 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2879 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2880 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3976 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7163 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7165 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7458 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-26599 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2345253 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html