CVE-2025-62229 (CNNVD-202510-4269)
HIGH
中文标题:
Red Hat Enterprise Linux 资源管理错误漏洞
英文标题:
Xorg: xmayland: use-after-free in xpresentnotify structure creation
CVSS分数:
7.3
发布时间:
2025-10-30 05:28:48
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
Red Hat Enterprise Linux是美国红帽(Red Hat)公司的面向企业用户的Linux操作系统。 Red Hat Enterprise Linux存在资源管理错误漏洞,该漏洞源于X11 Present扩展通知处理过程中错误处理不当,可能导致释放后重用,进而导致内存损坏或崩溃,可能允许攻击者执行任意代码或导致拒绝服务。
英文描述:
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 | - | - | - |
cpe:/o:redhat:enterprise_linux:10.0
|
| Red Hat | Red Hat Enterprise Linux 8 | 8 | - | - |
cpe:/a:redhat:enterprise_linux:8::appstream
|
| Red Hat | Red Hat Enterprise Linux 9 | 9 | - | - |
cpe:/a:redhat:enterprise_linux:9::crb
|
| Red Hat | Red Hat Enterprise Linux 6 | - | - | - |
cpe:/o:redhat:enterprise_linux:6
|
| Red Hat | Red Hat Enterprise Linux 7 | - | - | - |
cpe:/o:redhat:enterprise_linux:7
|
| X.Org | Xwayland | - | < 24.1.9 | - |
cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*
|
| Red Hat | Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION | - | - | - |
cpe:/o:redhat:rhel_els:6
|
| Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support | - | - | - |
cpe:/o:redhat:rhel_els:7
|
| Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | 8.2 | - | - |
cpe:/a:redhat:rhel_aus:8.2::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | 8.4 | - | - |
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | 8.4 | - | - |
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | 8.6 | - | - |
cpe:/a:redhat:rhel_tus:8.6::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.8 Telecommunications Update Service | 8.8 | - | - |
cpe:/a:redhat:rhel_tus:8.8::appstream
|
| Red Hat | Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | 8.8 | - | - |
cpe:/a:redhat:rhel_tus:8.8::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | 9.0 | - | - |
cpe:/a:redhat:rhel_e4s:9.0::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | 9.2 | - | - |
cpe:/a:redhat:rhel_e4s:9.2::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | 9.4 | - | - |
cpe:/a:redhat:rhel_eus:9.4::appstream
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2025:19432
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19433
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19434
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19435
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19489
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19623
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:19909
vendor-advisory
cve.org
访问
cve.org
无标题
vdb-entry
cve.org
访问
cve.org
RHBZ#2402649
issue-tracking
cve.org
访问
cve.org
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
RHSA-2025:20958
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:20960
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:20961
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:21035
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22040
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22041
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22051
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22055
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22056
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22077
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22096
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22164
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22167
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22364
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22365
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22426
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22427
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22667
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22729
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22742
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:22753
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0031
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0033
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0034
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0035
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0036
vendor-advisory
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
HIGH
7.3
CVSS向量:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
机密性
LOW
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-10-30 05:28:48
修改时间:
2025-11-06 23:41:06
创建时间:
2025-11-11 15:40:48
更新时间:
2026-01-12 02:27:57
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-62229 |
2025-11-11 15:23:33 | 2025-11-11 07:40:48 |
| NVD | nvd_CVE-2025-62229 |
2025-11-11 15:01:07 | 2025-11-11 07:48:35 |
| CNNVD | cnnvd_CNNVD-202510-4269 |
2025-11-11 15:12:31 | 2025-11-11 08:00:20 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v4
CVE
2026-01-12 02:12:12
affected_products_count: 5 → 19; references_count: 11 → 37
查看详细变更
- affected_products_count: 5 -> 19
- references_count: 11 -> 37
v3
CNNVD
2025-11-11 16:00:20
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-202510-4269; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-202510-4269
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:48:35
affected_products_count: 11 → 5; references_count: 9 → 11; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 11 -> 5
- references_count: 9 -> 11
- data_sources: ['cve'] -> ['cve', 'nvd']