Amazon Linux 2 Security Advisory: ALAS2-2025-3066
Advisory Released Date: 2025-11-10
Advisory Updated Date: 2025-11-10
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service. (CVE-2025-62229)
When removing the Xkb resources for a client, the function XkbRemoveResourceClient() will free the XkbInterest data associated with the device, but not the resource associated with it. As a result, when the client terminates, the resource delete function triggers a use-after-free.
NOTE: https://lists.x.org/archives/xorg-announce/2025-October/003635.html
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/99790a2c9205a52fbbec01f21a92c9b7f4ed1d8f
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/10c94238bdad17c11707e0bdaaa3a9cd54c504be
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/865089ca70840c0f13a61df135f7b44a9782a175 (xorg-server-21.1.19)
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/87fe2553937a99fd914ad0cde999376a3adc3839 (xorg-server-21.1.19) (CVE-2025-62230)
The XkbCompatMap structure stores some of its values using an unsigned short, but fails to check whether the sum of the input data might overflow the maximum unsigned short value
Introduced in: X11R6
Fixed in: xorg-server-21.1.19 and xwayland-24.1.9
Fix: https://gitlab.freedesktop.org/xorg/xserver/-/commit/475d9f49
NOTE: https://lists.x.org/archives/xorg-announce/2025-October/003635.html
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/475d9f49acd0e55bc0b089ed77f732ad18585470
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/3baad99f9c15028ed8c3e3d8408e5ec35db155aa (xorg-server-21.1.19) (CVE-2025-62231)
Affected Packages:
xorg-x11-server
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update xorg-x11-server or yum update --advisory ALAS2-2025-3066 to update your system.
aarch64:
xorg-x11-server-common-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xorg-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xnest-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xdmx-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xvfb-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xephyr-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-Xwayland-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-devel-1.20.4-22.amzn2.0.10.aarch64
xorg-x11-server-debuginfo-1.20.4-22.amzn2.0.10.aarch64
i686:
xorg-x11-server-common-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xorg-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xnest-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xdmx-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xvfb-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xephyr-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-Xwayland-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-devel-1.20.4-22.amzn2.0.10.i686
xorg-x11-server-debuginfo-1.20.4-22.amzn2.0.10.i686
noarch:
xorg-x11-server-source-1.20.4-22.amzn2.0.10.noarch
src:
xorg-x11-server-1.20.4-22.amzn2.0.10.src
x86_64:
xorg-x11-server-common-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xorg-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xnest-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xdmx-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xvfb-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xephyr-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-Xwayland-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-devel-1.20.4-22.amzn2.0.10.x86_64
xorg-x11-server-debuginfo-1.20.4-22.amzn2.0.10.x86_64