CVE-2025-26599
📋 TL;DR
This CVE describes an uninitialized pointer vulnerability in X.Org and Xwayland display servers. When compCheckRedirect() fails to allocate a backing pixmap, compRedirectWindow() returns a BadAlloc error without properly cleaning up partially initialized window tree data, leading to potential use of an uninitialized pointer. This affects systems running X.Org Server or Xwayland with compositing enabled.
💻 Affected Systems
- X.Org Server
- Xwayland
📦 What is this software?
Tigervnc by Tigervnc
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, arbitrary code execution, or system crash leading to denial of service.
Likely Case
Application crashes, denial of service affecting graphical sessions, or limited information disclosure.
If Mitigated
Minimal impact with proper access controls and isolation; crashes contained to user session.
🎯 Exploit Status
Exploitation requires local access to a graphical session and knowledge of memory layout; no public exploits known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Red Hat advisories RHSA-2025:2500, RHSA-2025:2502, RHSA-2025:2861, RHSA-2025:2862, RHSA-2025:2865 for specific patched versions.
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:2500
Restart Required: No
Instructions:
1. Update X.Org/Xwayland packages using your distribution's package manager. 2. For Red Hat systems: 'yum update' or 'dnf update' followed by package restart. 3. Restart graphical sessions to apply changes.
🔧 Temporary Workarounds
Disable compositing
allTemporarily disable window compositing to mitigate the vulnerability.
Check desktop environment settings to disable compositing/effects
🧯 If You Can't Patch
- Restrict local access to graphical sessions using access controls.
- Monitor for crashes in X.Org/Xwayland processes and investigate anomalies.
🔍 How to Verify
Check if Vulnerable:
Check installed X.Org/Xwayland version against patched versions in Red Hat advisories.
Check Version:
For X.Org: 'Xorg -version'; For Xwayland: 'Xwayland -version' or check package version with 'rpm -q xorg-x11-server' or 'dpkg -l xserver-xorg-core'
Verify Fix Applied:
Verify package version after update matches patched version from vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- X.Org/Xwayland crash logs in /var/log/Xorg.0.log
- Application crashes related to BadAlloc errors
Network Indicators:
- None - local exploitation only
SIEM Query:
Search for 'BadAlloc' or 'segmentation fault' in X.Org logs or system logs from X server processes.
🔗 References
- https://access.redhat.com/errata/RHSA-2025:2500
- https://access.redhat.com/errata/RHSA-2025:2502
- https://access.redhat.com/errata/RHSA-2025:2861
- https://access.redhat.com/errata/RHSA-2025:2862
- https://access.redhat.com/errata/RHSA-2025:2865
- https://access.redhat.com/errata/RHSA-2025:2866
- https://access.redhat.com/errata/RHSA-2025:2873
- https://access.redhat.com/errata/RHSA-2025:2874
- https://access.redhat.com/errata/RHSA-2025:2875
- https://access.redhat.com/errata/RHSA-2025:2879
- https://access.redhat.com/errata/RHSA-2025:2880
- https://access.redhat.com/errata/RHSA-2025:7163
- https://access.redhat.com/errata/RHSA-2025:7165
- https://access.redhat.com/errata/RHSA-2025:7458
- https://access.redhat.com/security/cve/CVE-2025-26599
- https://bugzilla.redhat.com/show_bug.cgi?id=2345253
- https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html