{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-62229: fix use-after-free caused by incorrect error cleanup in\n  present notify handling\n- CVE-2025-62230: fix use-after-free caused by improper XKB resource cleanup\n- CVE-2025-62231: fix overflow caused by improper bounds checking in\n  XkbSetCompatMap()",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2025/clsa-2025_1764081820.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-16T09:51:08Z",
      "generator": {
        "date": "2026-02-16T09:51:08Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1764081820",
      "initial_release_date": "2025-11-25T14:44:46Z",
      "revision_history": [
        {
          "date": "2025-11-25T14:44:46Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-02-16T09:51:08Z",
          "number": "2",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "xorg-x11-server-Xwayland: Fix of 3 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xwayland@21.1.3-7.el9.tuxcare.els13?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xwayland-devel@21.1.3-7.el9.tuxcare.els13?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xwayland@21.1.3-7.el9.tuxcare.els13?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xwayland-devel@21.1.3-7.el9.tuxcare.els13?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-62229",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62229"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-9632",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-9632"
        }
      ],
      "release_date": "2024-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26596",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26596"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26596",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26596"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345256",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345256"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00036.html"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-62231",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62231"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-62230",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62230"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-49176",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
          "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49176"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-25T14:43:42.761736Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820",
          "product_ids": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1764081820"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-0:21.1.3-7.el9.tuxcare.els13.x86_64",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.i686",
            "AlmaLinux-9.2:xorg-x11-server-Xwayland-devel-0:21.1.3-7.el9.tuxcare.els13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}