A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-26597.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "21.1.16"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]