- Description
- A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
- Source
- secalert@redhat.com
- NVD status
- Modified
- Products
- tigervnc, x_server, xwayland, enterprise_linux
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
- 🚨 CVE-2025-26594 🔴 HIGH (7.8) 🏢 Red Hat - Red Hat Enterprise Linux 6 🏗️ None 🔗 https://t.co/2mBSqvaygX 🔗 https://t.co/oqNU2AQTsU #CyberCron #VulnAlert @RedHat https://t.co/mD5N5WA9X1 - @cybercronai - 27 Feb 2025 - 13 Impressions - 0 Retweets - 1 Like - 0 Bookmarks - 0 Replies - 0 Quotes 
- 🚨 #CVE-2025-26594 - XOrg Server and Xwayland Vulnerability: Detection and Mitigation https://t.co/eN6AcY3BeG - @UndercodeUpdate - 25 Feb 2025 - 8 Impressions - 0 Retweets - 0 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
- CVE-2025-26594 A use-after-free flaw was found in https://t.co/NfcYnrk5RQ and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the inte… https://t.co/W4JyNfS4zC - @CVEnew - 25 Feb 2025 - 348 Impressions - 0 Retweets - 0 Likes - 0 Bookmarks - 0 Replies - 0 Quotes 
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "79A8316C-BA22-441E-92AF-415AFABCEB76"
          }
        ],
        "operator": "OR"
      }
    ]
  },
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "07E5F462-A20F-472C-85E7-804D46F01A7A",
            "versionEndExcluding": "21.1.16"
          },
          {
            "criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "1CBC57E6-F54D-4B54-9263-9753CCA3EEF7",
            "versionEndExcluding": "24.1.6"
          }
        ],
        "operator": "OR"
      }
    ]
  },
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
          },
          {
            "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
          },
          {
            "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]