Bug 2369954 (CVE-2025-49176)

Summary: CVE-2025-49176 xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2025-06-17   

Description OSIDB Bzimport 2025-06-03 07:20:47 UTC
nteger Overflow vulnerability in the Big Requests extension. The request length is multiplied before validation, allowing an overflow that defeats the size check, potentially leading to memory corruption.

Comment 4 errata-xmlrpc 2025-06-23 01:27:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:9304 https://access.redhat.com/errata/RHSA-2025:9304

Comment 5 errata-xmlrpc 2025-06-23 01:58:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:9306 https://access.redhat.com/errata/RHSA-2025:9306

Comment 6 errata-xmlrpc 2025-06-23 02:36:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:9305 https://access.redhat.com/errata/RHSA-2025:9305

Comment 7 errata-xmlrpc 2025-06-23 02:50:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:9303 https://access.redhat.com/errata/RHSA-2025:9303

Comment 8 errata-xmlrpc 2025-06-23 14:05:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:9392 https://access.redhat.com/errata/RHSA-2025:9392