Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
X11 Library Buffer Overflow Risk: Data Corruption
OESA-2026-1587
Summary
The X11 library has a bug that could allow an attacker to damage data. This is a moderate risk because it could be exploited by a malicious user. Update the library to the latest version to fix the issue.
What to do
- Update libx11 to version 1.6.9-9.oe2003sp4.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | libx11 | <= 1.6.9-9.oe2003sp4 | 1.6.9-9.oe2003sp4 |
Original title
libX11 security update
Original description
Core X11 protocol client library.
Security Fix(es):
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.(CVE-2025-26597)
Security Fix(es):
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.(CVE-2025-26597)
- https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-26597 Vendor Advisory
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026