Critical Vulnerability Information Vulnerability Overview Type/Severity: Important Subject: xorg-x11-server-Xwayland Security Update Description: Xwayland is an X server used to run X clients under Wayland. This update fixes multiple security vulnerabilities. Vulnerability Details CVE-2024-9632: xorg-x11-server: tigervnc: Heap-based buffer overflow leading to privilege escalation CVE-2025-26594: X.Org: Xwayland: Use-after-free in PyncintTrigger() CVE-2025-26600: xorg: xwayland: Use-after-free in PlayReleasedEvents() CVE-2025-26599: xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() CVE-2025-26598: xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() CVE-2025-26597: xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() CVE-2025-26596: xorg: xwayland: Heap overflow in XkbWriteKeySyms() CVE-2025-26595: xorg: xwayland: Buffer overflow in XkbModMaskText() Affected Products Red Hat Enterprise Linux for x86_64 10 Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 Red Hat Enterprise Linux for IBM z Systems 10 Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 Other related products and versions Solution Reference Link: https://access.redhat.com/articles/11258 References https://access.redhat.com/security/updates/classification/#important