Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

X11 Library: Buffer Overflow in XkbChangeTypesOfKey Function

OESA-2026-1591
Summary

The X11 library has a flaw that could allow an attacker to crash the system. This could happen if certain keyboard settings are manipulated. Update your system to the latest version of the library to fix the issue.

What to do
  • Update libx11 to version 1.8.7-3.oe2403sp2.
Affected software
VendorProductAffected versionsFix available
– libx11 <= 1.8.7-3.oe2403sp2 1.8.7-3.oe2403sp2
Original title
libX11 security update
Original description
Core X11 protocol client library.

Security Fix(es):

A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.(CVE-2025-26597)
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026