{"id":"CVE-2025-26599","summary":"Xorg: xwayland: use of uninitialized pointer in compredirectwindow()","details":"An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.","modified":"2026-05-15T11:54:17.796314106Z","published":"2025-02-25T15:55:02.964Z","related":["ALSA-2025:2500","ALSA-2025:2502","ALSA-2025:7163","ALSA-2025:7165","SUSE-SU-2025:0729-1","SUSE-SU-2025:0730-1","SUSE-SU-2025:0731-1","SUSE-SU-2025:0732-1","SUSE-SU-2025:0733-1","SUSE-SU-2025:0734-1","openSUSE-SU-2025:14841-1","openSUSE-SU-2025:14842-1"],"database_specific":{"cna_assigner":"redhat","cwe_ids":["CWE-824"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/26xxx/CVE-2025-26599.json"},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2500"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2502"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2861"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2862"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2865"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2866"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2873"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2874"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2875"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2879"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2880"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:3976"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7163"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7165"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:7458"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-26599"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/26xxx/CVE-2025-26599.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-26599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345253"},{"type":"PACKAGE","url":"https://gitlab.freedesktop.org/xorg/xserver/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}