๐Ÿ” CVE Alert

CVE-2025-62229

HIGH 7.3

Xorg: xmayland: use-after-free in xpresentnotify structure creation

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.

CWE CWE-416
Vendor x.org
Product xwayland
Published Oct 30, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for x.org xwayland

Be the first to know when new high vulnerabilities affecting x.org xwayland are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High

Affected Versions

X.Org / Xwayland
1.15.0 < 24.1.9
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19432 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19433 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19434 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19435 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19489 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19623 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19909 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20958 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20960 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20961 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21035 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22040 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22041 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22051 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22055 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22056 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22077 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22096 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22164 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22167 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22364 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22365 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22426 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22427 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22667 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22729 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22742 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22753 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0031 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0033 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0034 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0035 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0036 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-62229 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2402649 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html openwall.com: http://www.openwall.com/lists/oss-security/2025/10/28/7

Credits

Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.