Description

A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.

INFO

Published Date :

2025-06-17T14:54:42.646Z

Last Modified :

2025-12-11T15:43:22.202Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-49178 vulnerability.

Vendors Products
Redhat
  • Enterprise Linux
  • Rhel Aus
  • Rhel E4s
  • Rhel Els
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-49178.

URL Resource
https://access.redhat.com/errata/RHSA-2025:10258 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10342 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10343 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10344 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10346 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10347 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10348 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10349 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10350 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10351 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10352 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10355 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10356 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10360 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10370 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10374 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10375 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10376 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10377 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10378 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10381 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10410 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9303 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9305 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9306 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9392 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9964 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2025-49178 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2369977 cve-icon cve-icon
https://gitlab.freedesktop.org/xorg/xserver/-/commit/d55c54cecb5e83eaa2d56bed5cc4461f9ba318c2 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2025/06/msg00028.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2025-49178 cve-icon
https://www.cve.org/CVERecord?id=CVE-2025-49178 cve-icon
https://www.x.org/wiki/Development/Security/ cve-icon cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact