CVE-2025-62229

A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
redhatCNA
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Debian logo
Debian Releases
Debian Product
Codename
xorg-server
bullseye
vulnerable
trixie
ignored
bookworm
ignored
bullseye (security)
2:1.20.11-1+deb11u17
fixed
bookworm (security)
2:21.1.7-3+deb12u11
fixed
trixie (security)
2:21.1.16-1.3+deb13u1
fixed
forky
vulnerable
sid
2:21.1.20-1
fixed
xwayland
bookworm
ignored
trixie
ignored
forky
vulnerable
sid
vulnerable