880
VMScore

CVE-2025-26600

CVSSv4: NA | CVSSv3: 7.8 | CVSSv2: NA | VMScore: 880 | EPSS: 0.00025 | KEV: Not Included
Published: 25/02/2025 Updated: 16/05/2025

Vulnerability Summary

X.Org and Xwayland Use-After-Free Vulnerability in Device Event Handling

A use-after-free vulnerability exists in X.Org and Xwayland software. The issue occurs when a device is removed while it remains in a frozen state. Events queued for the device continue to exist even after the device has been freed. If these events are later replayed, a use-after-free condition will be triggered, potentially leading to system instability or security risks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

red hat red hat enterprise linux 10

red hat red hat enterprise linux 7 extended lifecycle support

red hat red hat enterprise linux 8

red hat red hat enterprise linux 8.2 advanced update support

red hat red hat enterprise linux 8.4 advanced mission critical update support

red hat red hat enterprise linux 8.4 telecommunications update service

red hat red hat enterprise linux 8.4 update services for sap solutions

red hat red hat enterprise linux 8.6 advanced mission critical update support

red hat red hat enterprise linux 8.6 telecommunications update service

red hat red hat enterprise linux 8.6 update services for sap solutions

red hat red hat enterprise linux 8.8 extended update support

red hat red hat enterprise linux 9

red hat red hat enterprise linux 9.0 update services for sap solutions

red hat red hat enterprise linux 9.2 extended update support

red hat red hat enterprise linux 9.4 extended update support

red hat red hat enterprise linux 6

tigervnc tigervnc -

x.org x server

x.org xwayland

redhat enterprise linux 7.0

redhat enterprise linux 8.0

redhat enterprise linux 9.0

Vendor Advisories

Debian Bug report logs - #1098906 xorg-server: CVE-2025-26594 CVE-2025-26595 CVE-2025-26596 CVE-2025-26597 CVE-2025-26598 CVE-2025-26599 CVE-2025-26600 CVE-2025-26601 Package: src:xorg-server; Maintainer for src:xorg-server is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debi ...
A use-after-free flaw was found in XOrg and Xwayland The root cursor is referenced in the X server as a global variable If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free (CVE-2025-26594) A buffer overflow flaw was found in XOrg and Xwayland The code in XkbVModMaskText() allocates a fi ...

Mailing Lists

---------- Forwarded message --------- From: Olivier Fourdan <ofourdan () redhat com> Date: Tue, Feb 25, 2025 at 4:39 PM Subject: XOrg Security Advisory: multiple security issues XOrg X server and Xwayland To: <xorg-announce () lists x org> Cc: <xorg () lists x org>, xorg-devel <xorg-devel () lists x org> ============= ...