Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-62230 (GCVE-0-2025-62230)
Vulnerability from cvelistv5
- CWE-416 - Use After Free
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected: 0:24.1.5-5.el10_0 < * cpe:/o:redhat:enterprise_linux:10.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-62230",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T03:55:33.668Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:14:18.339Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/28/7"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.0"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:24.1.5-5.el10_0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:24.1.5-5.el10_1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.4-33.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.8.0-36.el7_9.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:21.1.3-19.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-27.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.15.0-8.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.15",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-6.el8_6.15",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-6.el8_6.15",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-6.el8_6.15",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-32.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.14.1-9.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.2.7-5.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.15.0-6.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.2.7-5.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-32.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-22.el9_0.16",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-14.el9_2.13",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.13.1-8.el9_4.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue."
}
],
"datePublic": "2025-10-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-25T17:26:15.162Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2025:19432",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"name": "RHSA-2025:19433",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"name": "RHSA-2025:19434",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"name": "RHSA-2025:19435",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"name": "RHSA-2025:19489",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"name": "RHSA-2025:19623",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"name": "RHSA-2025:19909",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"name": "RHSA-2025:20958",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"name": "RHSA-2025:20960",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"name": "RHSA-2025:20961",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"name": "RHSA-2025:21035",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"name": "RHSA-2025:22040",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"name": "RHSA-2025:22041",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"name": "RHSA-2025:22051",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"name": "RHSA-2025:22055",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"name": "RHSA-2025:22056",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"name": "RHSA-2025:22077",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"name": "RHSA-2025:22096",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"name": "RHBZ#2402653",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-09T06:00:07.571000+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-10-29T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Xorg: xwayland: use-after-free in xkb client resource removal",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"x_redhatCweChain": "CWE-416: Use After Free"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-62230",
"datePublished": "2025-10-30T05:19:40.445Z",
"dateReserved": "2025-10-09T04:46:44.074Z",
"dateUpdated": "2025-11-25T17:26:15.162Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-62230\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-10-30T06:15:45.593\",\"lastModified\":\"2025-11-25T18:15:53.400\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19432\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19433\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19434\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19435\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19489\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19623\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19909\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:20958\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:20960\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:20961\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:21035\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22040\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22051\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22055\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22056\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22077\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:22096\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-62230\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2402653\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/10/28/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/10/28/7\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:14:18.339Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-62230\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-30T13:35:30.209516Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-30T13:35:58.194Z\"}}], \"cna\": {\"title\": \"Xorg: xwayland: use-after-free in xkb client resource removal\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:24.1.5-5.el10_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:24.1.5-5.el10_1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.4-33.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.8.0-36.el7_9.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.1.3-19.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::crb\", \"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-27.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.15.0-8.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.15\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.15\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.15\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.6::appstream\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_e4s:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.15\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-32.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.14.1-9.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.2.7-5.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.15.0-6.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.2.7-5.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-32.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-22.el9_0.16\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-14.el9_2.13\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-8.el9_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-10-09T06:00:07.571000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-10-29T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-10-29T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:19432\", \"name\": \"RHSA-2025:19432\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19433\", \"name\": \"RHSA-2025:19433\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19434\", \"name\": \"RHSA-2025:19434\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19435\", \"name\": \"RHSA-2025:19435\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19489\", \"name\": \"RHSA-2025:19489\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19623\", \"name\": \"RHSA-2025:19623\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19909\", \"name\": \"RHSA-2025:19909\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:20958\", \"name\": \"RHSA-2025:20958\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:20960\", \"name\": \"RHSA-2025:20960\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:20961\", \"name\": \"RHSA-2025:20961\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:21035\", \"name\": \"RHSA-2025:21035\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22040\", \"name\": \"RHSA-2025:22040\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22041\", \"name\": \"RHSA-2025:22041\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22051\", \"name\": \"RHSA-2025:22051\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22055\", \"name\": \"RHSA-2025:22055\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22056\", \"name\": \"RHSA-2025:22056\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22077\", \"name\": \"RHSA-2025:22077\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:22096\", \"name\": \"RHSA-2025:22096\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-62230\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2402653\", \"name\": \"RHBZ#2402653\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was discovered in the X.Org X server\\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-25T17:26:15.162Z\"}, \"x_redhatCweChain\": \"CWE-416: Use After Free\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-62230\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-25T17:26:15.162Z\", \"dateReserved\": \"2025-10-09T04:46:44.074Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-10-30T05:19:40.445Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
fkie_cve-2025-62230
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19432 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19433 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19434 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19435 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19489 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19623 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19909 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:20958 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:20960 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:20961 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:21035 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22040 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22041 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22051 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22055 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22056 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22077 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:22096 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-62230 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2402653 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/10/28/7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect."
}
],
"id": "CVE-2025-62230",
"lastModified": "2025-11-25T18:15:53.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-10-30T06:15:45.593",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/10/28/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
rhsa-2025:22055
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22055",
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22055.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:54+00:00",
"generator": {
"date": "2025-11-25T21:29:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22055",
"initial_release_date": "2025-11-25T08:31:09+00:00",
"revision_history": [
{
"date": "2025-11-25T08:31:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T08:31:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.13.src",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.src",
"product_id": "tigervnc-0:1.12.0-14.el9_2.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.13?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.13?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.13?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.13?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.13?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"product_id": "tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"product_id": "tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.13?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.13.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:31:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:31:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:31:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.src",
"AppStream-9.2.0.Z.E4S:tigervnc-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-debugsource-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-icons-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-license-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-selinux-0:1.12.0-14.el9_2.13.noarch",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-0:1.12.0-14.el9_2.13.x86_64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.aarch64",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.ppc64le",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.s390x",
"AppStream-9.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19623
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Please update",
"title": "Topic"
},
{
"category": "general",
"text": "Please update",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19623",
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19623.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland update",
"tracking": {
"current_release_date": "2025-11-25T21:29:33+00:00",
"generator": {
"date": "2025-11-25T21:29:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19623",
"initial_release_date": "2025-11-04T10:35:41+00:00",
"revision_history": [
{
"date": "2025-11-04T10:35:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-04T10:35:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-04T10:35:41+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-04T10:35:41+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-04T10:35:41+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22077
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22077",
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22077.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:30:01+00:00",
"generator": {
"date": "2025-11-25T21:30:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22077",
"initial_release_date": "2025-11-25T13:07:15+00:00",
"revision_history": [
{
"date": "2025-11-25T13:07:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T13:07:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:30:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.15.src",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.15.src",
"product_id": "tigervnc-0:1.9.0-15.el8_2.15.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.15?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.15?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"product": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"product_id": "tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"product": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"product_id": "tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.15?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.15.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.15.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T13:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T13:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T13:07:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.15.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.15.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:20960
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:20960",
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_20960.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:30+00:00",
"generator": {
"date": "2025-11-25T21:29:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:20960",
"initial_release_date": "2025-11-11T15:09:24+00:00",
"revision_history": [
{
"date": "2025-11-11T15:09:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-11T15:09:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-5.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-5.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-5.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-5.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:09:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:09:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:09:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-5.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-5.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19435
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19435",
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19435.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:31+00:00",
"generator": {
"date": "2025-11-25T21:29:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19435",
"initial_release_date": "2025-11-03T08:53:44+00:00",
"revision_history": [
{
"date": "2025-11-03T08:53:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-03T08:53:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:53:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:53:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:53:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"AppStream-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.src",
"CRB-10.0.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_0.x86_64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.aarch64",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.ppc64le",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.s390x",
"CRB-10.0.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19433
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Please update",
"title": "Topic"
},
{
"category": "general",
"text": "Please update",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19433",
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19433.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server update",
"tracking": {
"current_release_date": "2025-11-25T21:29:35+00:00",
"generator": {
"date": "2025-11-25T21:29:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19433",
"initial_release_date": "2025-11-03T09:11:58+00:00",
"revision_history": [
{
"date": "2025-11-03T09:11:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-03T09:11:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-32.el9_6.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-32.el9_6.src",
"product_id": "xorg-x11-server-0:1.20.11-32.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-32.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-32.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-32.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-32.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-32.el9_6.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-32.el9_6.src",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"relates_to_product_reference": "CRB-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:58+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:58+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:58+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-32.el9_6.src",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.aarch64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.i686",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.ppc64le",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.s390x",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-32.el9_6.x86_64",
"CRB-9.6.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-32.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22056
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22056",
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22056.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:52+00:00",
"generator": {
"date": "2025-11-25T21:29:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22056",
"initial_release_date": "2025-11-25T08:24:14+00:00",
"revision_history": [
{
"date": "2025-11-25T08:24:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T08:24:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.16.src",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.src",
"product_id": "tigervnc-0:1.11.0-22.el9_0.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.16?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.16?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.16?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.16?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.16?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"product_id": "tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"product_id": "tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.16?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.16.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.16.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.16.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:24:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:24:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:24:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.src",
"AppStream-9.0.0.Z.E4S:tigervnc-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-debugsource-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-icons-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-license-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-selinux-0:1.11.0-22.el9_0.16.noarch",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-0:1.11.0-22.el9_0.16.x86_64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.aarch64",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.ppc64le",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.s390x",
"AppStream-9.0.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.16.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:20961
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:20961",
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_20961.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:33+00:00",
"generator": {
"date": "2025-11-25T21:29:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:20961",
"initial_release_date": "2025-11-11T15:10:03+00:00",
"revision_history": [
{
"date": "2025-11-11T15:10:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-11T15:10:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-32.el9_7.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-32.el9_7.src",
"product_id": "xorg-x11-server-0:1.20.11-32.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-32.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-32.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-32.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-32.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-32.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-32.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-32.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:10:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:10:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:10:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-32.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-32.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-32.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19434
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19434",
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19434.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:32+00:00",
"generator": {
"date": "2025-11-25T21:29:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19434",
"initial_release_date": "2025-11-03T09:11:23+00:00",
"revision_history": [
{
"date": "2025-11-03T09:11:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-03T09:11:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-27.el8_10.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-27.el8_10.src",
"product_id": "xorg-x11-server-0:1.20.11-27.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-27.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-27.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-27.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-27.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-27.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-27.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-27.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-27.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-27.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-27.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-27.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-27.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-27.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-27.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-27.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T09:11:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-27.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-27.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-27.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19489
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19489",
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19489.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:30+00:00",
"generator": {
"date": "2025-11-25T21:29:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19489",
"initial_release_date": "2025-11-03T16:00:24+00:00",
"revision_history": [
{
"date": "2025-11-03T16:00:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-03T16:00:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.14.1-9.el9_6.src",
"product": {
"name": "tigervnc-0:1.14.1-9.el9_6.src",
"product_id": "tigervnc-0:1.14.1-9.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.14.1-9.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.14.1-9.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.14.1-9.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.14.1-9.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.14.1-9.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.14.1-9.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.14.1-9.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.14.1-9.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.14.1-9.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"product": {
"name": "tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"product_id": "tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.14.1-9.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.14.1-9.el9_6.noarch",
"product": {
"name": "tigervnc-license-0:1.14.1-9.el9_6.noarch",
"product_id": "tigervnc-license-0:1.14.1-9.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.14.1-9.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"product": {
"name": "tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"product_id": "tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.14.1-9.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.14.1-9.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src"
},
"product_reference": "tigervnc-0:1.14.1-9.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.14.1-9.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch"
},
"product_reference": "tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.14.1-9.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch"
},
"product_reference": "tigervnc-license-0:1.14.1-9.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.14.1-9.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch"
},
"product_reference": "tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T16:00:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T16:00:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T16:00:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-icons-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-license-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-selinux-0:1.14.1-9.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-0:1.14.1-9.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.14.1-9.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:21035
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:21035",
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_21035.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:29+00:00",
"generator": {
"date": "2025-11-25T21:29:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:21035",
"initial_release_date": "2025-11-11T19:57:01+00:00",
"revision_history": [
{
"date": "2025-11-11T19:57:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-11T19:57:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-5.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T19:57:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T19:57:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T19:57:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-5.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19432
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19432",
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19432.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:34+00:00",
"generator": {
"date": "2025-11-25T21:29:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19432",
"initial_release_date": "2025-11-03T08:51:43+00:00",
"revision_history": [
{
"date": "2025-11-03T08:51:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-03T08:51:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-19.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-19.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-19.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-19.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-19.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-19.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-19.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-19.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-19.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-19.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-19.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-19.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-19.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:51:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:51:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-03T08:51:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-19.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-19.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:19909
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19909",
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19909.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:36+00:00",
"generator": {
"date": "2025-11-25T21:29:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:19909",
"initial_release_date": "2025-11-06T13:08:32+00:00",
"revision_history": [
{
"date": "2025-11-06T13:08:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-06T13:08:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-8.el8_10.src",
"product": {
"name": "tigervnc-0:1.15.0-8.el8_10.src",
"product_id": "tigervnc-0:1.15.0-8.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-8.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-8.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-8.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-8.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-8.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-8.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-8.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-8.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-8.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"product": {
"name": "tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"product_id": "tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.15.0-8.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.15.0-8.el8_10.noarch",
"product": {
"name": "tigervnc-license-0:1.15.0-8.el8_10.noarch",
"product_id": "tigervnc-license-0:1.15.0-8.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.15.0-8.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"product": {
"name": "tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"product_id": "tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.15.0-8.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-8.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src"
},
"product_reference": "tigervnc-0:1.15.0-8.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.15.0-8.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch"
},
"product_reference": "tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.15.0-8.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch"
},
"product_reference": "tigervnc-license-0:1.15.0-8.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.15.0-8.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch"
},
"product_reference": "tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-06T13:08:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-06T13:08:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-06T13:08:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.15.0-8.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.15.0-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.15.0-8.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22040
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22040",
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22040.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:47+00:00",
"generator": {
"date": "2025-11-25T21:29:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22040",
"initial_release_date": "2025-11-25T07:57:39+00:00",
"revision_history": [
{
"date": "2025-11-25T07:57:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T07:57:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.4-33.el7_9.src",
"product": {
"name": "xorg-x11-server-0:1.20.4-33.el7_9.src",
"product_id": "xorg-x11-server-0:1.20.4-33.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-33.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-33.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-33.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-33.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-33.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-33.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"product_id": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-33.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-33.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-33.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-33.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"product_id": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-33.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-33.el7_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-33.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-33.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-33.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-33.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-33.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:57:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:57:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:57:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch",
"7Server-optional-ELS:xorg-x11-server-0:1.20.4-33.el7_9.src",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xdmx-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xephyr-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xnest-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xorg-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xvfb-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-Xwayland-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-common-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.s390x",
"7Server-optional-ELS:xorg-x11-server-debuginfo-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.i686",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.ppc64le",
"7Server-optional-ELS:xorg-x11-server-devel-0:1.20.4-33.el7_9.x86_64",
"7Server-optional-ELS:xorg-x11-server-source-0:1.20.4-33.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22041
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22041",
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22041.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:54+00:00",
"generator": {
"date": "2025-11-25T21:29:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22041",
"initial_release_date": "2025-11-25T07:56:54+00:00",
"revision_history": [
{
"date": "2025-11-25T07:56:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T07:56:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.15.src",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.src",
"product_id": "tigervnc-0:1.12.0-6.el8_6.15.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.15?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.15?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"product_id": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"product_id": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.15?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.15?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.15?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.15?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:56:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:56:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T07:56:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:tigervnc-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-debugsource-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-icons-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-license-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-selinux-0:1.12.0-6.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:tigervnc-server-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-0:1.12.0-6.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.15.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:20958
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:20958",
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_20958.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:23+00:00",
"generator": {
"date": "2025-11-25T21:29:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:20958",
"initial_release_date": "2025-11-11T15:07:34+00:00",
"revision_history": [
{
"date": "2025-11-11T15:07:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-11T15:07:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.src",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.src",
"product_id": "tigervnc-0:1.15.0-6.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"product": {
"name": "tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"product_id": "tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.15.0-6.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.15.0-6.el9_7.noarch",
"product": {
"name": "tigervnc-license-0:1.15.0-6.el9_7.noarch",
"product_id": "tigervnc-license-0:1.15.0-6.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.15.0-6.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"product_id": "tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.15.0-6.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.15.0-6.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch"
},
"product_reference": "tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.15.0-6.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch"
},
"product_reference": "tigervnc-license-0:1.15.0-6.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:07:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:07:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-11T15:07:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22051
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22051",
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22051.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:55+00:00",
"generator": {
"date": "2025-11-25T21:29:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22051",
"initial_release_date": "2025-11-25T08:39:49+00:00",
"revision_history": [
{
"date": "2025-11-25T08:39:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T08:39:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-8.el9_4.8.src",
"product": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.src",
"product_id": "tigervnc-0:1.13.1-8.el9_4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"product_id": "tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-8.el9_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"product_id": "tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-8.el9_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-8.el9_4.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src"
},
"product_reference": "tigervnc-0:1.13.1-8.el9_4.8.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-8.el9_4.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-8.el9_4.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:39:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:39:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T08:39:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.src",
"AppStream-9.4.0.Z.EUS:tigervnc-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-icons-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-license-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.8.noarch",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.8.x86_64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.aarch64",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.ppc64le",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.s390x",
"AppStream-9.4.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
rhsa-2025:22096
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)\n\n* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)\n\n* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22096",
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22096.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-25T21:29:55+00:00",
"generator": {
"date": "2025-11-25T21:29:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:22096",
"initial_release_date": "2025-11-25T17:25:56+00:00",
"revision_history": [
{
"date": "2025-11-25T17:25:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-25T17:25:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-25T21:29:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-36.el7_9.3.src",
"product": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.src",
"product_id": "tigervnc-0:1.8.0-36.el7_9.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-36.el7_9.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"product": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"product_id": "tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-36.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"product": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"product_id": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-36.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"product_id": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-36.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"product_id": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-36.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"product_id": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-36.el7_9.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"product": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"product_id": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-36.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"product": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"product_id": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-36.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-36.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-36.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"product_id": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-36.el7_9.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"product": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"product_id": "tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-36.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"product": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"product_id": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-36.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"product_id": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-36.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"product_id": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-36.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"product_id": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-36.el7_9.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-36.el7_9.3.s390x",
"product": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.s390x",
"product_id": "tigervnc-0:1.8.0-36.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-36.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"product": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"product_id": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-36.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"product_id": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-36.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"product_id": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-36.el7_9.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"product": {
"name": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"product_id": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-36.el7_9.3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"product": {
"name": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"product_id": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-36.el7_9.3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"product_id": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-36.el7_9.3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62229",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T05:04:24.644000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Use-after-free in XPresentNotify structure creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate. The flaw is a use-after-free in X11 Present notification handling that could lead to integrity and availability impacts if exploited. Moreover, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, limiting the potential impact and preventing system-wide compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "RHBZ#2402649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62229"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T17:25:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Use-after-free in XPresentNotify structure creation"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-10-09T06:00:07.571000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402653"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: Use-after-free in Xkb client resource removal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate.The flaw is a use-after-free in Xkb client resource cleanup that could lead to integrity and availability impacts if exploited. However, the X.Org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, which limits the potential impact and prevents full system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "RHBZ#2402653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T17:25:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: Use-after-free in Xkb client resource removal"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2025-62231",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-10-09T06:41:16.314000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402660"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the X.Org X server\u2019s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xmayland: Value overflow in XkbSetCompatMap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Moderate for default RHEL 8 and 9, where the X.Org server does not run with root privileges.For RHEL 7, TigerVNC-as-root, or SSH X11-forwarded environments, the impact is considered High due to the potential for local privilege escalation or remote code execution, as it can be exploited remotely to cause denial of service through crafted keyboard mapping requests. Successful exploitation could crash the X server but is not likely to lead to code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "RHBZ#2402660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62231"
}
],
"release_date": "2025-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-25T17:25:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.src",
"7Server-optional-ELS:tigervnc-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-debuginfo-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-icons-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-license-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-applet-0:1.8.0-36.el7_9.3.noarch",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.s390x",
"7Server-optional-ELS:tigervnc-server-minimal-0:1.8.0-36.el7_9.3.x86_64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.ppc64le",
"7Server-optional-ELS:tigervnc-server-module-0:1.8.0-36.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xmayland: Value overflow in XkbSetCompatMap()"
}
]
}
suse-su-2025:3864-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3864,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3864,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3864,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3864,SUSE-SLE-Product-WE-15-SP6-2025-3864,SUSE-SLE-Product-WE-15-SP7-2025-3864,SUSE-Storage-7.1-2025-3864",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3864-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3864-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253864-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3864-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-10-30T13:40:00Z",
"generator": {
"date": "2025-10-30T13:40:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3864-1",
"initial_release_date": "2025-10-30T13:40:00Z",
"revision_history": [
{
"date": "2025-10-30T13:40:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.aarch64",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.aarch64",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.aarch64",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.i586",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.i586",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.118.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.i586",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.i586",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.i586",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.i586",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.i586",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.i586",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.ppc64le",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.ppc64le",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.ppc64le",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.118.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.s390x",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.s390x",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.s390x",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.x86_64",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.118.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:00Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:00Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:xorg-x11-server-wayland-1.20.3-150200.22.5.118.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:00Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3866-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3866,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3866,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3866,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3866,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3866",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3866-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3866-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253866-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3866-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-10-30T13:40:40Z",
"generator": {
"date": "2025-10-30T13:40:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3866-1",
"initial_release_date": "2025-10-30T13:40:40Z",
"revision_history": [
{
"date": "2025-10-30T13:40:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"product_id": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.43.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.43.1.i586",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.i586",
"product_id": "xorg-x11-server-21.1.4-150500.7.43.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.i586",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.43.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.i586",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.43.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"product_id": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.43.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"product_id": "xorg-x11-server-21.1.4-150500.7.43.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.s390x",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.43.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"product_id": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.43.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.43.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:40Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:40Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.43.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.43.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:40Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3858-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3858,SUSE-SLE-SERVER-12-SP5-LTSS-2025-3858,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3858",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3858-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3858-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253858-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3858-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-10-29T15:09:00Z",
"generator": {
"date": "2025-10-29T15:09:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3858-1",
"initial_release_date": "2025-10-29T15:09:00Z",
"revision_history": [
{
"date": "2025-10-29T15:09:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.aarch64",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.aarch64",
"product_id": "xorg-x11-server-1.19.6-10.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.aarch64",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.i586",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.i586",
"product_id": "xorg-x11-server-1.19.6-10.94.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.i586",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.i586",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.i586",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.i586",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.ppc64le",
"product_id": "xorg-x11-server-1.19.6-10.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.ppc64le",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.s390",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.s390",
"product_id": "xorg-x11-server-1.19.6-10.94.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.s390",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.s390",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.s390",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.s390",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.s390",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.s390",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.s390x",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.s390x",
"product_id": "xorg-x11-server-1.19.6-10.94.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.s390x",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.s390x",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.94.1.x86_64",
"product": {
"name": "xorg-x11-server-1.19.6-10.94.1.x86_64",
"product_id": "xorg-x11-server-1.19.6-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"product_id": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.94.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.94.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.94.1.x86_64",
"product_id": "xorg-x11-server-source-1.19.6-10.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.94.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64"
},
"product_reference": "xorg-x11-server-1.19.6-10.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.94.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.19.6-10.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.94.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x"
},
"product_reference": "xorg-x11-server-1.19.6-10.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.94.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T15:09:00Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T15:09:00Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.94.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T15:09:00Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3872-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3872,SUSE-SLE-Module-Basesystem-15-SP6-2025-3872,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3872,openSUSE-SLE-15.6-2025-3872",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3872-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3872-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253872-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3872-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-10-30T15:09:46Z",
"generator": {
"date": "2025-10-30T15:09:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3872-1",
"initial_release_date": "2025-10-30T15:09:46Z",
"revision_history": [
{
"date": "2025-10-30T15:09:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"product_id": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.20.1.i586",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.i586",
"product_id": "xorg-x11-server-21.1.11-150600.5.20.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.i586",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.20.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.i586",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"product_id": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"product_id": "xorg-x11-server-21.1.11-150600.5.20.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"product_id": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:09:46Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:09:46Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.20.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:09:46Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3865-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3865,SUSE-SLE-Module-Basesystem-15-SP7-2025-3865,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3865",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3865-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3865-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3865-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-10-30T13:40:16Z",
"generator": {
"date": "2025-10-30T13:40:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3865-1",
"initial_release_date": "2025-10-30T13:40:16Z",
"revision_history": [
{
"date": "2025-10-30T13:40:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"product_id": "xorg-x11-server-21.1.15-150700.5.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.11.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.11.1.i586",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.i586",
"product_id": "xorg-x11-server-21.1.15-150700.5.11.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.i586",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.11.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.i586",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.11.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"product_id": "xorg-x11-server-21.1.15-150700.5.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.11.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"product_id": "xorg-x11-server-21.1.15-150700.5.11.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.s390x",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"product_id": "xorg-x11-server-21.1.15-150700.5.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.11.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:16Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:16Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:40:16Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3863-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3863,SUSE-SLE-Product-WE-15-SP6-2025-3863,openSUSE-SLE-15.6-2025-3863",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3863-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3863-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253863-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3863-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2025-10-30T13:39:29Z",
"generator": {
"date": "2025-10-30T13:39:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3863-1",
"initial_release_date": "2025-10-30T13:39:29Z",
"revision_history": [
{
"date": "2025-10-30T13:39:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.18.1.aarch64",
"product": {
"name": "xwayland-24.1.1-150600.5.18.1.aarch64",
"product_id": "xwayland-24.1.1-150600.5.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"product_id": "xwayland-devel-24.1.1-150600.5.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.18.1.i586",
"product": {
"name": "xwayland-24.1.1-150600.5.18.1.i586",
"product_id": "xwayland-24.1.1-150600.5.18.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.18.1.i586",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.i586",
"product_id": "xwayland-devel-24.1.1-150600.5.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.18.1.ppc64le",
"product": {
"name": "xwayland-24.1.1-150600.5.18.1.ppc64le",
"product_id": "xwayland-24.1.1-150600.5.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"product_id": "xwayland-devel-24.1.1-150600.5.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.18.1.s390x",
"product": {
"name": "xwayland-24.1.1-150600.5.18.1.s390x",
"product_id": "xwayland-24.1.1-150600.5.18.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.18.1.s390x",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.s390x",
"product_id": "xwayland-devel-24.1.1-150600.5.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.18.1.x86_64",
"product": {
"name": "xwayland-24.1.1-150600.5.18.1.x86_64",
"product_id": "xwayland-24.1.1-150600.5.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.18.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.x86_64",
"product_id": "xwayland-devel-24.1.1-150600.5.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.18.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64"
},
"product_reference": "xwayland-24.1.1-150600.5.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.18.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64"
},
"product_reference": "xwayland-24.1.1-150600.5.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.18.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le"
},
"product_reference": "xwayland-24.1.1-150600.5.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.18.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x"
},
"product_reference": "xwayland-24.1.1-150600.5.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.18.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64"
},
"product_reference": "xwayland-24.1.1-150600.5.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.18.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:39:29Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:39:29Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.18.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T13:39:29Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3874-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n - Fixed Use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n - Fixed Value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3874,SUSE-SLE-Product-WE-15-SP7-2025-3874",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3874-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3874-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253874-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3874-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2025-10-30T15:25:37Z",
"generator": {
"date": "2025-10-30T15:25:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3874-1",
"initial_release_date": "2025-10-30T15:25:37Z",
"revision_history": [
{
"date": "2025-10-30T15:25:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.9.1.aarch64",
"product": {
"name": "xwayland-24.1.5-150700.3.9.1.aarch64",
"product_id": "xwayland-24.1.5-150700.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.9.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.9.1.aarch64",
"product_id": "xwayland-devel-24.1.5-150700.3.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.9.1.i586",
"product": {
"name": "xwayland-24.1.5-150700.3.9.1.i586",
"product_id": "xwayland-24.1.5-150700.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.9.1.i586",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.9.1.i586",
"product_id": "xwayland-devel-24.1.5-150700.3.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.9.1.ppc64le",
"product": {
"name": "xwayland-24.1.5-150700.3.9.1.ppc64le",
"product_id": "xwayland-24.1.5-150700.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.9.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.9.1.ppc64le",
"product_id": "xwayland-devel-24.1.5-150700.3.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.9.1.s390x",
"product": {
"name": "xwayland-24.1.5-150700.3.9.1.s390x",
"product_id": "xwayland-24.1.5-150700.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.9.1.s390x",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.9.1.s390x",
"product_id": "xwayland-devel-24.1.5-150700.3.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.9.1.x86_64",
"product": {
"name": "xwayland-24.1.5-150700.3.9.1.x86_64",
"product_id": "xwayland-24.1.5-150700.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.9.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.9.1.x86_64",
"product_id": "xwayland-devel-24.1.5-150700.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.5-150700.3.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
},
"product_reference": "xwayland-24.1.5-150700.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:25:37Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:25:37Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-30T15:25:37Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
suse-su-2025:3909-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)\n * Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)\n * Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3909,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3909,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3909,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3909,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3909,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3909,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3909",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3909-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3909-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253909-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3909-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251958",
"url": "https://bugzilla.suse.com/1251958"
},
{
"category": "self",
"summary": "SUSE Bug 1251959",
"url": "https://bugzilla.suse.com/1251959"
},
{
"category": "self",
"summary": "SUSE Bug 1251960",
"url": "https://bugzilla.suse.com/1251960"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2025-11-02T12:16:51Z",
"generator": {
"date": "2025-11-02T12:16:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3909-1",
"initial_release_date": "2025-11-02T12:16:51Z",
"revision_history": [
{
"date": "2025-11-02T12:16:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"product_id": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.aarch64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.63.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.63.1.i586",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.i586",
"product_id": "xorg-x11-server-1.20.3-150400.38.63.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.i586",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.63.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.i586",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.i586",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.i586",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.63.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"product_id": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.ppc64le",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.63.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"product_id": "xorg-x11-server-1.20.3-150400.38.63.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.s390x",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.63.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"product_id": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.63.1.x86_64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.63.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy LTS 4.3",
"product": {
"name": "SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server LTS 4.3",
"product": {
"name": "SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server-lts:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-02T12:16:51Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-02T12:16:51Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Proxy LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-1.20.3-150400.38.63.1.x86_64",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.ppc64le",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.s390x",
"SUSE Manager Server LTS 4.3:xorg-x11-server-extra-1.20.3-150400.38.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-02T12:16:51Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
opensuse-su-2025:15683-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xorg-x11-server-21.1.15-7.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xorg-x11-server-21.1.15-7.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15683",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15683-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "xorg-x11-server-21.1.15-7.1 on GA media",
"tracking": {
"current_release_date": "2025-10-29T00:00:00Z",
"generator": {
"date": "2025-10-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15683-1",
"initial_release_date": "2025-10-29T00:00:00Z",
"revision_history": [
{
"date": "2025-10-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-21.1.15-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.15-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.15-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.15-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"product": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"product_id": "xorg-x11-server-wrapper-21.1.15-7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-21.1.15-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.15-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.15-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.15-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"product": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"product_id": "xorg-x11-server-wrapper-21.1.15-7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-21.1.15-7.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.15-7.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.15-7.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.15-7.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-source-21.1.15-7.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"product": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"product_id": "xorg-x11-server-wrapper-21.1.15-7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-21.1.15-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.15-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.15-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.15-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.15-7.1.x86_64",
"product": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.x86_64",
"product_id": "xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-source-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-source-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-source-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-source-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64"
},
"product_reference": "xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le"
},
"product_reference": "xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x"
},
"product_reference": "xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.15-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
},
"product_reference": "xorg-x11-server-wrapper-21.1.15-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.15-7.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.15-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
opensuse-su-2025:15684-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xwayland-24.1.8-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xwayland-24.1.8-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15684",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15684-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62231/"
}
],
"title": "xwayland-24.1.8-4.1 on GA media",
"tracking": {
"current_release_date": "2025-10-29T00:00:00Z",
"generator": {
"date": "2025-10-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15684-1",
"initial_release_date": "2025-10-29T00:00:00Z",
"revision_history": [
{
"date": "2025-10-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.8-4.1.aarch64",
"product": {
"name": "xwayland-24.1.8-4.1.aarch64",
"product_id": "xwayland-24.1.8-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.8-4.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.8-4.1.aarch64",
"product_id": "xwayland-devel-24.1.8-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.8-4.1.ppc64le",
"product": {
"name": "xwayland-24.1.8-4.1.ppc64le",
"product_id": "xwayland-24.1.8-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.8-4.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.8-4.1.ppc64le",
"product_id": "xwayland-devel-24.1.8-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.8-4.1.s390x",
"product": {
"name": "xwayland-24.1.8-4.1.s390x",
"product_id": "xwayland-24.1.8-4.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.8-4.1.s390x",
"product": {
"name": "xwayland-devel-24.1.8-4.1.s390x",
"product_id": "xwayland-devel-24.1.8-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.8-4.1.x86_64",
"product": {
"name": "xwayland-24.1.8-4.1.x86_64",
"product_id": "xwayland-24.1.8-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.8-4.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.8-4.1.x86_64",
"product_id": "xwayland-devel-24.1.8-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.8-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64"
},
"product_reference": "xwayland-24.1.8-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.8-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le"
},
"product_reference": "xwayland-24.1.8-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.8-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x"
},
"product_reference": "xwayland-24.1.8-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.8-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64"
},
"product_reference": "xwayland-24.1.8-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.8-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64"
},
"product_reference": "xwayland-devel-24.1.8-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.8-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le"
},
"product_reference": "xwayland-devel-24.1.8-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.8-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x"
},
"product_reference": "xwayland-devel-24.1.8-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.8-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
},
"product_reference": "xwayland-devel-24.1.8-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62229"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62229",
"url": "https://www.suse.com/security/cve/CVE-2025-62229"
},
{
"category": "external",
"summary": "SUSE Bug 1251958 for CVE-2025-62229",
"url": "https://bugzilla.suse.com/1251958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62230"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the X.Org X server\u0027s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62230",
"url": "https://www.suse.com/security/cve/CVE-2025-62230"
},
{
"category": "external",
"summary": "SUSE Bug 1251959 for CVE-2025-62230",
"url": "https://bugzilla.suse.com/1251959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62231"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was identified in the X.Org X server\u0027s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62231",
"url": "https://www.suse.com/security/cve/CVE-2025-62231"
},
{
"category": "external",
"summary": "SUSE Bug 1251960 for CVE-2025-62231",
"url": "https://bugzilla.suse.com/1251960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-24.1.8-4.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-24.1.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62231"
}
]
}
wid-sec-w-2025-2436
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Xwayland ist ein X-Server f\u00fcr die Ausf\u00fchrung von X-Clients unter Wayland Display Servern. Wayland ist ein Ersatz f\u00fcr X.11 Display-Server.\r\nDas X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xwayland und X.Org X11 ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2436 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2436.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2436 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2436"
},
{
"category": "external",
"summary": "X.Org Security Advisory: multiple security issues X.Org X server and Xwayland vom 2025-10-28",
"url": "https://lists.x.org/archives/xorg-announce/2025-October/003635.html"
},
{
"category": "external",
"summary": "xorg-server 21.1.19 vom 2025-10-28",
"url": "https://lists.x.org/archives/xorg-announce/2025-October/003636.html"
},
{
"category": "external",
"summary": "xwayland 24.1.9 vom 2025-10-28",
"url": "https://lists.x.org/archives/xorg-announce/2025-October/003637.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6044 vom 2025-10-29",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00210.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-43C76ECE40 vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-43c76ece40"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-FE61A6AD60 vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-fe61a6ad60"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-6F416148B4 vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-6f416148b4"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-B36B5A6FE4 vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-b36b5a6fe4"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-DF25DB07FB vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-df25db07fb"
},
{
"category": "external",
"summary": "OpenBSD Security Fix vom 2025-10-28",
"url": "http://www.openbsd.org/errata77.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6044 vom 2025-10-29",
"url": "https://security-tracker.debian.org/tracker/DSA-6044-1"
},
{
"category": "external",
"summary": "OpenBSD Security Fix vom 2025-10-28",
"url": "http://www.openbsd.org/errata78.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-0E29263F5A vom 2025-10-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-0e29263f5a"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3858-1 vom 2025-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4353 vom 2025-10-29",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7846-1 vom 2025-10-29",
"url": "https://ubuntu.com/security/notices/USN-7846-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3872-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3866-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3874-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3865-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3864-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3863-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3909-1 vom 2025-11-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19435 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15684-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KZL252YO3EJKAIOMLL26QLD4D4VGXXI/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15683-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QNOJOQBOIEATVYCDPWMUGTBYB3LHWLW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3909-1 vom 2025-11-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRHOCFDCDHINQTHEAIAERR6DZ7P5E5HV/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19432 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19433 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19434 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19433 vom 2025-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-19433.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19489 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19489 vom 2025-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-19489.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19435 vom 2025-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-19435.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19434 vom 2025-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-19434.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19432 vom 2025-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-19432.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19434 vom 2025-11-04",
"url": "https://errata.build.resf.org/RLSA-2025:19434"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19623 vom 2025-11-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-19623.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19623 vom 2025-11-04",
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19435 vom 2025-11-06",
"url": "https://errata.build.resf.org/RLSA-2025:19435"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19909 vom 2025-11-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-19909.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19909 vom 2025-11-06",
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19432 vom 2025-11-07",
"url": "https://errata.build.resf.org/RLSA-2025:19432"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3065 vom 2025-11-11",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3065.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3066 vom 2025-11-11",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3066.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20958 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20960 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21035 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20961 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20960 vom 2025-11-12",
"url": "https://errata.build.resf.org/RLSA-2025:20960"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20961 vom 2025-11-12",
"url": "https://errata.build.resf.org/RLSA-2025:20961"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-E0C935675D vom 2025-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-e0c935675d"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-F59B250C31 vom 2025-11-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-f59b250c31"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22055 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22051 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22040 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22041 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22056 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
}
],
"source_lang": "en-US",
"title": "Xwayland und X.Org X11: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T08:37:17.342+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2436",
"initial_release_date": "2025-10-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE, European Union Vulnerability Database, Debian und Ubuntu aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE und European Union Vulnerability Database aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE, Red Hat und openSUSE aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-06T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
},
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "T048849",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.1.19",
"product": {
"name": "Open Source X.Org X11 \u003c21.1.19",
"product_id": "T048176"
}
},
{
"category": "product_version",
"name": "21.1.19",
"product": {
"name": "Open Source X.Org X11 21.1.19",
"product_id": "T048176-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x:x.org_x11:21.1.19"
}
}
}
],
"category": "product_name",
"name": "X.Org X11"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1.9",
"product": {
"name": "Open Source Xwayland \u003c24.1.9",
"product_id": "T048175"
}
},
{
"category": "product_version",
"name": "24.1.9",
"product": {
"name": "Open Source Xwayland 24.1.9",
"product_id": "T048175-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x.org:xwayland:24.1.9"
}
}
}
],
"category": "product_name",
"name": "Xwayland"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.7",
"product": {
"name": "OpenBSD OpenBSD 7.7",
"product_id": "T043361",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openbsd:7.7"
}
}
},
{
"category": "product_version",
"name": "7.8",
"product": {
"name": "OpenBSD OpenBSD 7.8",
"product_id": "T048191",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openbsd:7.8"
}
}
}
],
"category": "product_name",
"name": "OpenBSD"
}
],
"category": "vendor",
"name": "OpenBSD"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62229",
"product_status": {
"known_affected": [
"T048191",
"T048175",
"67646",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T000126",
"T048849",
"T027843",
"398363",
"T043361",
"T048176"
]
},
"release_date": "2025-10-28T23:00:00.000+00:00",
"title": "CVE-2025-62229"
},
{
"cve": "CVE-2025-62230",
"product_status": {
"known_affected": [
"T048191",
"T048175",
"67646",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T000126",
"T048849",
"T027843",
"398363",
"T043361",
"T048176"
]
},
"release_date": "2025-10-28T23:00:00.000+00:00",
"title": "CVE-2025-62230"
},
{
"cve": "CVE-2025-62231",
"product_status": {
"known_affected": [
"T048191",
"T048175",
"67646",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T000126",
"T048849",
"T027843",
"398363",
"T043361",
"T048176"
]
},
"release_date": "2025-10-28T23:00:00.000+00:00",
"title": "CVE-2025-62231"
}
]
}
ghsa-892r-x96w-jh76
Vulnerability from github
A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
{
"affected": [],
"aliases": [
"CVE-2025-62230"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-30T06:15:45Z",
"severity": "HIGH"
},
"details": "A flaw was discovered in the X.Org X server\u2019s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
"id": "GHSA-892r-x96w-jh76",
"modified": "2025-11-25T18:32:22Z",
"published": "2025-10-30T06:30:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62230"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00033.html"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402653"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-62230"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22096"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22077"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22056"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22055"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22051"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22041"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:22040"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:21035"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:20961"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:20960"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:20958"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19909"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19623"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19489"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19435"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19434"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19433"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19432"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/10/28/7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"type": "CVSS_V3"
}
]
}
msrc_cve-2025-62230
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-62230 Xorg: xwayland: use-after-free in xkb client resource removal - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-62230.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Xorg: xwayland: use-after-free in xkb client resource removal",
"tracking": {
"current_release_date": "2025-11-02T01:02:49.000Z",
"generator": {
"date": "2025-11-04T20:08:19.289Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-62230",
"initial_release_date": "2025-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-02T01:02:49.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 xorg-x11-server-Xwayland 24.1.6-2",
"product": {
"name": "\u003cazl3 xorg-x11-server-Xwayland 24.1.6-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 xorg-x11-server-Xwayland 24.1.6-2",
"product": {
"name": "azl3 xorg-x11-server-Xwayland 24.1.6-2",
"product_id": "19615"
}
}
],
"category": "product_name",
"name": "xorg-x11-server-Xwayland"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 xorg-x11-server-Xwayland 24.1.6-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 xorg-x11-server-Xwayland 24.1.6-2 as a component of Azure Linux 3.0",
"product_id": "19615-17084"
},
"product_reference": "19615",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62230",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19615-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-62230 Xorg: xwayland: use-after-free in xkb client resource removal - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-62230.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-02T01:02:49.000Z",
"details": "24.1.6-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "Xorg: xwayland: use-after-free in xkb client resource removal"
}
]
}
CERTFR-2025-AVI-0966
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 golang 1.22.7-5 | ||
| Microsoft | N/A | azl3 golang 1.23.12-1 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 moby-engine 25.0.3-13 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | azl3 kernel 6.6.104.2-4 | ||
| Microsoft | N/A | cbl2 msft-golang 1.24.8-1 | ||
| Microsoft | N/A | azl3 gh 2.62.0-9 | ||
| Microsoft | N/A | azl3 frr 9.1.1-3 | ||
| Microsoft | N/A | azl3 xorg-x11-server-Xwayland 24.1.6-2 versions antérieures à 24.1.6-3 | ||
| Microsoft | N/A | cbl2 libcontainers-common 20210626-7 | ||
| Microsoft | N/A | cbl2 moby-engine 24.0.9-18 | ||
| Microsoft | N/A | cbl2 frr 8.5.5-3 | ||
| Microsoft | N/A | azl3 containerized-data-importer 1.57.0-16 | ||
| Microsoft | N/A | azl3 skopeo 1.14.4-6 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 keras 3.3.3-4 versions antérieures à 3.3.3-5 | ||
| Microsoft | N/A | cbl2 gcc 11.2.0-8 | ||
| Microsoft | N/A | cbl2 keras 2.11.0-3 | ||
| Microsoft | N/A | azl3 golang 1.25.3-1 | ||
| Microsoft | N/A | cbl2 tensorflow 2.11.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-4 | ||
| Microsoft | N/A | azl3 gcc 13.2.0-7 | ||
| Microsoft | N/A | cbl2 cri-o 1.22.3-16 | ||
| Microsoft | N/A | cbl2 skopeo 1.14.2-12 | ||
| Microsoft | N/A | cbl2 containerized-data-importer 1.55.0-25 | ||
| Microsoft | N/A | cbl2 golang 1.18.8-10 | ||
| Microsoft | N/A | azl3 libcontainers-common 20240213-3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 golang 1.22.7-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.23.12-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 moby-engine 25.0.3-13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.104.2-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 msft-golang 1.24.8-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gh 2.62.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 frr 9.1.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 xorg-x11-server-Xwayland 24.1.6-2 versions ant\u00e9rieures \u00e0 24.1.6-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-engine 24.0.9-18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 frr 8.5.5-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 containerized-data-importer 1.57.0-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 skopeo 1.14.4-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-4 versions ant\u00e9rieures \u00e0 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gcc 11.2.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 keras 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.3-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gcc 13.2.0-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cri-o 1.22.3-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 skopeo 1.14.2-12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 containerized-data-importer 1.55.0-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.18.8-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-61102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61102"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-61106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61106"
},
{
"name": "CVE-2025-61103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61103"
},
{
"name": "CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61105"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-12060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12060"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-12058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12058"
},
{
"name": "CVE-2025-61101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61101"
},
{
"name": "CVE-2025-61107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61107"
},
{
"name": "CVE-2025-61100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61100"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-61104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61104"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0966",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40099",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40083",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40083"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58186",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61103"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12058"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40087",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61100"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62229"
},
{
"published_at": "2025-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40106"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62231"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61102"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40084",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40084"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40094",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40104"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40085",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47912",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40092",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40096",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61107",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61107"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40088",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40088"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58183",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61101",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61723",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40095",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095"
},
{
"published_at": "2025-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12060"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58185"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58188",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58188"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.