Home

Description

A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.

PUBLISHED Reserved 2025-10-09 | Published 2025-10-30 | Updated 2025-12-04 | Assigner redhat




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

Problem types

Use After Free

Product status

Default status
affected

0:24.1.5-5.el10_0 (rpm) before *
unaffected

Default status
affected

0:24.1.5-5.el10_1 (rpm) before *
unaffected

Default status
affected

0:1.1.0-25.el6_10.15 (rpm) before *
unaffected

Default status
affected

0:1.20.4-33.el7_9 (rpm) before *
unaffected

Default status
affected

0:1.8.0-36.el7_9.3 (rpm) before *
unaffected

Default status
affected

0:21.1.3-19.el8_10 (rpm) before *
unaffected

Default status
affected

0:1.20.11-27.el8_10 (rpm) before *
unaffected

Default status
affected

0:1.15.0-8.el8_10 (rpm) before *
unaffected

Default status
affected

0:1.9.0-15.el8_2.15 (rpm) before *
unaffected

Default status
affected

0:1.20.6-5.el8_2 (rpm) before *
unaffected

Default status
affected

0:1.11.0-8.el8_4.14 (rpm) before *
unaffected

Default status
affected

0:1.20.10-3.el8_4 (rpm) before *
unaffected

Default status
affected

0:1.11.0-8.el8_4.14 (rpm) before *
unaffected

Default status
affected

0:1.20.10-3.el8_4 (rpm) before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.15 (rpm) before *
unaffected

Default status
affected

0:1.20.11-6.el8_6 (rpm) before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.15 (rpm) before *
unaffected

Default status
affected

0:1.20.11-6.el8_6 (rpm) before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.15 (rpm) before *
unaffected

Default status
affected

0:1.20.11-6.el8_6 (rpm) before *
unaffected

Default status
affected

0:1.12.0-15.el8_8.16 (rpm) before *
unaffected

Default status
affected

0:1.20.11-17.el8_8 (rpm) before *
unaffected

Default status
affected

0:1.12.0-15.el8_8.16 (rpm) before *
unaffected

Default status
affected

0:1.20.11-17.el8_8 (rpm) before *
unaffected

Default status
affected

0:1.20.11-32.el9_6 (rpm) before *
unaffected

Default status
affected

0:1.14.1-9.el9_6 (rpm) before *
unaffected

Default status
affected

0:23.2.7-5.el9_6 (rpm) before *
unaffected

Default status
affected

0:1.15.0-6.el9_7 (rpm) before *
unaffected

Default status
affected

0:23.2.7-5.el9_7 (rpm) before *
unaffected

Default status
affected

0:1.20.11-32.el9_7 (rpm) before *
unaffected

Default status
affected

0:1.11.0-22.el9_0.16 (rpm) before *
unaffected

Default status
affected

0:1.20.11-12.el9_0 (rpm) before *
unaffected

Default status
affected

0:1.12.0-14.el9_2.13 (rpm) before *
unaffected

Default status
affected

0:1.20.11-19.el9_2 (rpm) before *
unaffected

Default status
affected

0:1.13.1-8.el9_4.8 (rpm) before *
unaffected

Default status
affected

0:1.20.11-27.el9_4 (rpm) before *
unaffected

Default status
unknown

Timeline

2025-10-09:Reported to Red Hat.
2025-10-29:Made public.

Credits

Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.

References

lists.debian.org/debian-lts-announce/2025/10/msg00033.html

www.openwall.com/lists/oss-security/2025/10/28/7

access.redhat.com/errata/RHSA-2025:19432 (RHSA-2025:19432) vendor-advisory

access.redhat.com/errata/RHSA-2025:19433 (RHSA-2025:19433) vendor-advisory

access.redhat.com/errata/RHSA-2025:19434 (RHSA-2025:19434) vendor-advisory

access.redhat.com/errata/RHSA-2025:19435 (RHSA-2025:19435) vendor-advisory

access.redhat.com/errata/RHSA-2025:19489 (RHSA-2025:19489) vendor-advisory

access.redhat.com/errata/RHSA-2025:19623 (RHSA-2025:19623) vendor-advisory

access.redhat.com/errata/RHSA-2025:19909 (RHSA-2025:19909) vendor-advisory

access.redhat.com/errata/RHSA-2025:20958 (RHSA-2025:20958) vendor-advisory

access.redhat.com/errata/RHSA-2025:20960 (RHSA-2025:20960) vendor-advisory

access.redhat.com/errata/RHSA-2025:20961 (RHSA-2025:20961) vendor-advisory

access.redhat.com/errata/RHSA-2025:21035 (RHSA-2025:21035) vendor-advisory

access.redhat.com/errata/RHSA-2025:22040 (RHSA-2025:22040) vendor-advisory

access.redhat.com/errata/RHSA-2025:22041 (RHSA-2025:22041) vendor-advisory

access.redhat.com/errata/RHSA-2025:22051 (RHSA-2025:22051) vendor-advisory

access.redhat.com/errata/RHSA-2025:22055 (RHSA-2025:22055) vendor-advisory

access.redhat.com/errata/RHSA-2025:22056 (RHSA-2025:22056) vendor-advisory

access.redhat.com/errata/RHSA-2025:22077 (RHSA-2025:22077) vendor-advisory

access.redhat.com/errata/RHSA-2025:22096 (RHSA-2025:22096) vendor-advisory

access.redhat.com/errata/RHSA-2025:22164 (RHSA-2025:22164) vendor-advisory

access.redhat.com/errata/RHSA-2025:22167 (RHSA-2025:22167) vendor-advisory

access.redhat.com/errata/RHSA-2025:22364 (RHSA-2025:22364) vendor-advisory

access.redhat.com/errata/RHSA-2025:22365 (RHSA-2025:22365) vendor-advisory

access.redhat.com/errata/RHSA-2025:22426 (RHSA-2025:22426) vendor-advisory

access.redhat.com/errata/RHSA-2025:22427 (RHSA-2025:22427) vendor-advisory

access.redhat.com/errata/RHSA-2025:22667 (RHSA-2025:22667) vendor-advisory

access.redhat.com/errata/RHSA-2025:22729 (RHSA-2025:22729) vendor-advisory

access.redhat.com/errata/RHSA-2025:22742 (RHSA-2025:22742) vendor-advisory

access.redhat.com/errata/RHSA-2025:22753 (RHSA-2025:22753) vendor-advisory

access.redhat.com/security/cve/CVE-2025-62230 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2402653 (RHBZ#2402653) issue-tracking

cve.org (CVE-2025-62230)

nvd.nist.gov (CVE-2025-62230)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.