🔐 CVE Alert

CVE-2025-62231

HIGH 7.3

Xorg: xmayland: value overflow in xkbsetcompatmap()

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.

CWE CWE-190
Vendor x.org
Product xwayland
Published Oct 30, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for x.org xwayland

Be the first to know when new high vulnerabilities affecting x.org xwayland are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High

Affected Versions

X.Org / Xwayland
0 < 24.1.9
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19432 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19433 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19434 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19435 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19489 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19623 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19909 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20958 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20960 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20961 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21035 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22040 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22041 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22051 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22055 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22056 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22077 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22096 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22164 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22167 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22364 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22365 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22426 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22427 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22667 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22729 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22742 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22753 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0031 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0033 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0034 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0035 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0036 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-62231 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2402660 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html openwall.com: http://www.openwall.com/lists/oss-security/2025/10/28/7

Credits

Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.