880
VMScore

CVE-2025-26595

CVSSv4: NA | CVSSv3: 7.8 | CVSSv2: NA | VMScore: 880 | EPSS: 0.00029 | KEV: Not Included
Published: 25/02/2025 Updated: 13/05/2025

Vulnerability Summary

Buffer Overflow Vulnerability in X.Org and Xwayland XkbVModMaskText() Function

This vulnerability allows local malicious users to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the XkbVModMaskText function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

Vulnerable Product Search on Vulmon Subscribe to Product

red hat red hat enterprise linux 10

red hat red hat enterprise linux 7 extended lifecycle support

red hat red hat enterprise linux 8

red hat red hat enterprise linux 8.2 advanced update support

red hat red hat enterprise linux 8.4 advanced mission critical update support

red hat red hat enterprise linux 8.4 telecommunications update service

red hat red hat enterprise linux 8.4 update services for sap solutions

red hat red hat enterprise linux 8.6 advanced mission critical update support

red hat red hat enterprise linux 8.6 telecommunications update service

red hat red hat enterprise linux 8.6 update services for sap solutions

red hat red hat enterprise linux 8.8 extended update support

red hat red hat enterprise linux 9

red hat red hat enterprise linux 9.0 update services for sap solutions

red hat red hat enterprise linux 9.2 extended update support

red hat red hat enterprise linux 9.4 extended update support

red hat red hat enterprise linux 6

tigervnc tigervnc -

x.org x server

x.org xwayland

redhat enterprise linux 7.0

redhat enterprise linux 8.0

redhat enterprise linux 9.0

Vendor Advisories

Debian Bug report logs - #1098906 xorg-server: CVE-2025-26594 CVE-2025-26595 CVE-2025-26596 CVE-2025-26597 CVE-2025-26598 CVE-2025-26599 CVE-2025-26600 CVE-2025-26601 Package: src:xorg-server; Maintainer for src:xorg-server is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debi ...
A use-after-free flaw was found in XOrg and Xwayland The root cursor is referenced in the X server as a global variable If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free (CVE-2025-26594) A buffer overflow flaw was found in XOrg and Xwayland The code in XkbVModMaskText() allocates a fi ...

Mailing Lists

---------- Forwarded message --------- From: Olivier Fourdan <ofourdan () redhat com> Date: Tue, Feb 25, 2025 at 4:39 PM Subject: XOrg Security Advisory: multiple security issues XOrg X server and Xwayland To: <xorg-announce () lists x org> Cc: <xorg () lists x org>, xorg-devel <xorg-devel () lists x org> ============= ...