Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4353-1 | xorg-server security update |
Debian DSA |
DSA-6044-1 | xorg-server security update |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Thu, 30 Oct 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 30 Oct 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash. | |
| Title | Xorg: xmayland: value overflow in xkbsetcompatmap() | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-190 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-30T05:50:50.369Z
Reserved: 2025-10-09T04:46:44.074Z
Link: CVE-2025-62231
No data.
Status : Received
Published: 2025-10-30T05:15:39.120
Modified: 2025-10-30T06:15:45.810
Link: CVE-2025-62231
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA