{"id":"ALSA-2025:7165","summary":"Moderate: xorg-x11-server-Xwayland security update","details":"Xwayland is an X server for running X clients under Wayland.  \n\nSecurity Fix(es):  \n\n  * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)\n  * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)\n  * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)\n  * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)\n  * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)\n  * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)\n  * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)\n  * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)\n  * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  \n\nAdditional Changes:  \n\nFor detailed information on changes in this release, see the AlmaLinuxRelease Notes linked from the References section.\n","modified":"2026-02-04T02:30:18.541412Z","published":"2025-05-13T00:00:00Z","related":["CVE-2024-9632","CVE-2025-26594","CVE-2025-26595","CVE-2025-26596","CVE-2025-26597","CVE-2025-26598","CVE-2025-26599","CVE-2025-26600","CVE-2025-26601"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-9632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26594"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26595"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26596"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26598"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26600"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-26601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2317233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345251"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345252"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345253"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345254"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345255"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2345257"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2025-7165.html"}],"affected":[{"package":{"name":"xorg-x11-server-Xwayland","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/xorg-x11-server-Xwayland"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"23.2.7-3.el9_6"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:7165.json"}},{"package":{"name":"xorg-x11-server-Xwayland-devel","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/xorg-x11-server-Xwayland-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"23.2.7-3.el9_6"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:7165.json"}}],"schema_version":"1.7.3"}