Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49175: Out-of-bounds Read in X.Org xwayland

0
Medium
VulnerabilityCVE-2025-49175cvecve-2025-49175
Published: Tue Jun 17 2025 (06/17/2025, 14:39:39 UTC)
Source: CVE Database V5
Vendor/Project: X.Org
Product: xwayland

Description

A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:21:38 UTC

Technical Analysis

CVE-2025-49175 is a vulnerability identified in the X.Org xwayland component, specifically within the X Rendering extension's handling of animated cursors. The issue occurs when a client application provides zero cursors, but the xwayland server erroneously assumes that at least one cursor is present. This logic flaw results in an out-of-bounds read operation, which can cause the xwayland process to crash, leading to a denial-of-service (DoS) condition. The vulnerability is classified with a CVSS v3.1 score of 6.1, indicating medium severity. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects availability (A:H) with limited confidentiality impact (C:L) and no integrity impact (I:N). The flaw does not appear to allow code execution or privilege escalation but can disrupt graphical sessions relying on xwayland, which is a compatibility layer enabling X11 applications to run on Wayland compositors. No known exploits have been reported in the wild, and no patches are currently linked, suggesting that mitigation efforts should focus on monitoring updates from X.Org and related Linux distributions. The vulnerability was reserved and published in June 2025, with Red Hat as the assigner, indicating that enterprise Linux distributions may provide fixes soon.

Potential Impact

For European organizations, the primary impact of CVE-2025-49175 is the potential for denial-of-service attacks against systems running xwayland, which could disrupt graphical user sessions and dependent applications. This is particularly relevant for organizations using Linux desktops or servers with graphical interfaces that rely on X.Org components and Wayland compositors. Critical infrastructure operators, research institutions, and enterprises with Linux-based workstations or thin clients could experience operational interruptions. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact could affect productivity and service continuity. In environments where graphical session stability is crucial, such as control rooms or development workstations, repeated crashes could lead to increased downtime and recovery efforts. The requirement for local access and low privileges limits remote exploitation but does not eliminate insider threat or malware scenarios that could trigger the flaw.

Mitigation Recommendations

Organizations should monitor official X.Org and Linux distribution security advisories for patches addressing CVE-2025-49175 and apply them promptly once available. Until patches are released, administrators can mitigate risk by restricting local access to trusted users only and employing endpoint security controls to prevent untrusted code execution on systems running xwayland. Disabling or limiting the use of animated cursors in the X Rendering extension, if configurable, may reduce exposure. Additionally, implementing robust monitoring and alerting for xwayland crashes can help detect exploitation attempts early. For high-security environments, consider isolating graphical sessions or using alternative display server configurations that do not rely on xwayland. Regularly updating system software and applying principle of least privilege to user accounts will further reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-03T05:38:02.947Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68518079a8c921274385d6e3

Added to database: 6/17/2025, 2:49:29 PM

Last enriched: 12/11/2025, 9:21:38 PM

Last updated: 1/7/2026, 8:56:49 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats