{"id":"CVE-2025-26597","details":"A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.","modified":"2026-03-13T07:59:15.063206Z","published":"2025-02-25T16:15:38.797Z","related":["ALSA-2025:2500","ALSA-2025:2502","ALSA-2025:7163","ALSA-2025:7165","MGASA-2025-0086","SUSE-SU-2025:0729-1","SUSE-SU-2025:0730-1","SUSE-SU-2025:0731-1","SUSE-SU-2025:0732-1","SUSE-SU-2025:0733-1","SUSE-SU-2025:0734-1","SUSE-SU-2025:0739-1","SUSE-SU-2025:0740-1","SUSE-SU-2025:0757-1","SUSE-SU-2025:20161-1","SUSE-SU-2025:20299-1","openSUSE-SU-2025:14837-1","openSUSE-SU-2025:14841-1","openSUSE-SU-2025:14842-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-26597"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345255"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-26597.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"21.1.16"}]},{"events":[{"introduced":"0"},{"fixed":"24.1.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}