Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

X11 Library Buffer Overflow Risk: Data Corruption

OESA-2026-1587
Summary

The X11 library has a bug that could allow an attacker to damage data. This is a moderate risk because it could be exploited by a malicious user. Update the library to the latest version to fix the issue.

What to do
  • Update libx11 to version 1.6.9-9.oe2003sp4.
Affected software
VendorProductAffected versionsFix available
– libx11 <= 1.6.9-9.oe2003sp4 1.6.9-9.oe2003sp4
Original title
libX11 security update
Original description
Core X11 protocol client library.

Security Fix(es):

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.(CVE-2025-26597)
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026