{"id":"CVE-2025-26594","details":"A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.","modified":"2026-03-13T07:59:15.022729Z","published":"2025-02-25T16:15:38.227Z","related":["ALSA-2025:2500","ALSA-2025:2502","ALSA-2025:7163","ALSA-2025:7165","MGASA-2025-0086","SUSE-SU-2025:0729-1","SUSE-SU-2025:0730-1","SUSE-SU-2025:0731-1","SUSE-SU-2025:0732-1","SUSE-SU-2025:0733-1","SUSE-SU-2025:0734-1","openSUSE-SU-2025:14841-1","openSUSE-SU-2025:14842-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-26594"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345248"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-26594.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"21.1.16"}]},{"events":[{"introduced":"0"},{"fixed":"24.1.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}