CVE Alert: CVE-2025-62230 – Red Hat – Red Hat Enterprise Linux 10

CVE-2025-62230

HIGHNo exploitation known

A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.

CVSS v3.1 (7.3)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat, Red Hat
Product
Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, Red Hat Enterprise Linux 9, Red Hat Enterprise Linux 9
Versions
Not specified
CWE
CWE-416, Use After Free
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
Published
2025-10-30T05:19:40.445Z
Updated
2025-10-30T05:19:40.445Z
cpe:/o:redhat:enterprise_linux:10cpe:/o:redhat:enterprise_linux:6cpe:/o:redhat:enterprise_linux:6cpe:/o:redhat:enterprise_linux:7cpe:/o:redhat:enterprise_linux:7cpe:/o:redhat:enterprise_linux:8cpe:/o:redhat:enterprise_linux:8cpe:/o:redhat:enterprise_linux:8cpe:/o:redhat:enterprise_linux:9cpe:/o:redhat:enterprise_linux:9cpe:/o:redhat:enterprise_linux:9

AI Summary Analysis

Risk verdict

High severity local vulnerability in Xwayland Xkb client cleanup; exploitation requires local access and could lead to memory corruption or a crash. If recognised as actively exploitable (KEV or SSVC exploitation state), treat as priority 1.

Why this matters

A use-after-free in the X server’s Xkb handling could crash the process or corrupt memory, potentially enabling instability or privilege-related impact on the host. In environments with GUI access or shared host sessions, an attacker with local access could disrupt services or escalate capabilities within the user session.

Most likely attack path

Exploitation requires local access and low privileges, with no user interaction. An attacker who already has a local account could trigger a crafted X client interaction to provoke the cleanup sequence, causing a crash or memory issues in Xwayland, with scope unlikely to propagate beyond the Xorg/Xwayland process or user session.

Who is most exposed

Red Hat Enterprise Linux deployments running GUI components or remote desktop tooling (Xorg, Xwayland, tigervnc) across desktops, virtual desktops, and server workstations are at risk; environments with open workstation access are particularly affected.

Detection ideas

  • Unexplained Xwayland crashes or SIGSEGVs (core dumps).
  • Memory corruption diagnostics tied to Xkb cleanup sequences.
  • Increased crash rates during client disconnects.
  • Anomalous memory/heap errors in Xorg-related logs.
  • Core dumps or ASan-style reports in user sessions.

Mitigation and prioritisation

  • Apply patched packages via Red Hat advisories; upgrade to fixed xorg-x11-server-Xwayland and related components.
  • If patching is delayed, restrict local access to GUI services and tighten account limits; disable unnecessary Xorg/Xwayland usage where feasible.
  • Consider isolating X server components with SELinux/AppArmor and use Wayland where possible.
  • Engage change-management for patch rollout; test in staging before production.
  • If KEV or EPSS signals exploitation risk, treat as priority 1 and accelerate remediation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features