Untriaged
Permalink
CVE-2025-26595
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Xorg: xwayland: buffer overflow in xkbvmodmasktext()
A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
References
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7163 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7165 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7458 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7163 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7165 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7458 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7163 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7165 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7458 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7163 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7165 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7458 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html
- RHSA-2025:2500 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2502 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2861 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2862 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2865 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2866 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2873 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2874 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2875 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2879 x_refsource_REDHAT vendor-advisory
- RHSA-2025:2880 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7163 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7165 x_refsource_REDHAT vendor-advisory
- RHSA-2025:7458 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-26595 x_refsource_REDHAT vdb-entry
- RHBZ#2345257 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html
Affected products
xserver
- <21.1.16
- <24.1.6
tigervnc
- *
xorg-x11-server
- *
xorg-x11-server-Xwayland
- *