A flaw was found in the XFIXES extension. The XFixesSetClientDisconnectMode handler does not validate the request length, allowing a client to read unintended memory from previous requests.
[
{
"digest": {
"line_hashes": [
"212512185817114908330315849754126483953",
"183075613961962102197466952885061791092",
"200767976481932859747238091850331096735",
"329903745923149610322024024244277289427",
"68038257553205616310683673563088848223",
"135921025761760225350957697831482572892",
"180352799126415876349206107227182362102",
"284921132157604066125944551125834584816"
],
"threshold": 0.9
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-49177-256444f6",
"target": {
"file": "xfixes/disconnect.c"
},
"source": "https://gitlab.freedesktop.org/xorg/xserver@ab02fb96b1c701c3bb47617d965522c34befa6af"
},
{
"digest": {
"length": 185.0,
"function_hash": "2235683436015865244155312336556687129"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2025-49177-cba55f54",
"target": {
"file": "xfixes/disconnect.c",
"function": "ProcXFixesSetClientDisconnectMode"
},
"source": "https://gitlab.freedesktop.org/xorg/xserver@ab02fb96b1c701c3bb47617d965522c34befa6af"
}
]