Severity
7.8HIGH
EPSS
0.0%
top 94.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 25
Latest updateMar 17

Description

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDx.org/xwayland< 24.1.6
Debianxwayland< 2:24.1.6-1+1
NVDx.org/x_server< 21.1.16
Debianxorg-server< 2:1.20.11-1+deb11u15+3

Also affects: Enterprise Linux 7.0, 8.0, 9.0

🔴Vulnerability Details

3
CVEList
Xorg: xwayland: buffer overflow in xkbchangetypesofkey()2025-02-25
OSV
CVE-2025-26597: A buffer overflow flaw was found in X2025-02-25
GHSA
GHSA-7qjx-378m-p8hm: A buffer overflow flaw was found in X2025-02-25

📋Vendor Advisories

7
Ubuntu
X.Org X Server regression2025-03-17
Ubuntu
X.Org X Server vulnerabilities2025-03-10
BSD
OpenBSD 7.5 Errata 018: SECURITY FIX2025-02-25
Ubuntu
X.Org X Server vulnerabilities2025-02-25
Red Hat
xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey()2025-02-25