Untriaged
Permalink
CVE-2025-49177
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: data leak in xfixes extension's xfixessetclientdisconnectmode
A flaw was found in the XFIXES extension. The XFixesSetClientDisconnectMode handler does not validate the request length, allowing a client to read unintended memory from previous requests.
References
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9303 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9303 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9303 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d96…
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9303 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHSA-2025:10258 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9303 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9304 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-49177 x_refsource_REDHAT vdb-entry
- RHBZ#2369955 issue-tracking x_refsource_REDHAT
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/ab02fb96b1c701c3bb47617d96…
- https://www.x.org/wiki/Development/Security/
Affected products
tigervnc
xwayland
- <24.1.7
xorg-x11-server
- *
xorg-x11-server-Xwayland
- *