{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Rebuilt with xorg-x11-server-1.20.4-99.el7_9.tuxcare.els7, mitigating\n  the security vulnerabilities identified by the following CVEs:\n  CVE-2025-26594, CVE-2025-26595, CVE-2025-26596, CVE-2025-26597\n  CVE-2025-26598, CVE-2025-26599, CVE-2025-26600 and CVE-2025-26601,\n  CVE-2025-49175, CVE-2025-49176, CVE-2025-49178, CVE-2025-49179, CVE-2025-49180",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux7els/advisories/2025/clsa-2025_1760646561.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760646561",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760646561"
      }
    ],
    "tracking": {
      "current_release_date": "2025-10-16T20:31:25Z",
      "generator": {
        "date": "2025-10-16T20:31:25Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1760646561",
      "initial_release_date": "2025-10-16T20:31:25Z",
      "revision_history": [
        {
          "date": "2025-10-16T20:31:25Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "tigervnc: Fix of 13 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "Oracle-Linux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_id": "tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-server-minimal@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-server-module@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_id": "tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-server@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_id": "tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-icons@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_id": "tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-server-applet@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_id": "tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tigervnc-license@1.8.0-33.0.7.el7_9.tuxcare.els1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-49180",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49180"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-49175",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49175"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-26597",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26597"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26597",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26597"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345255",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345255"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26600",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26600"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26600",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26600"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345252",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345252"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20250516-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20250516-0005/"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26598",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26598"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26598",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26598"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345254",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345254"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26595",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26595"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26595",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26595"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345257",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345257"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-49178",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49178"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-49179",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49179"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-49176",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-49176"
        }
      ],
      "release_date": "2025-06-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26596",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26596"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26596",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26596"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345256",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345256"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26594",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26594"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26594",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26594"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345248",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345248"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26601",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26601"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26601",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26601"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345251"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20250516-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20250516-0004/"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-26599",
      "cwe": {
        "id": "CWE-824",
        "name": "Access of Uninitialized Pointer"
      },
      "notes": [
        {
          "category": "description",
          "text": "An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
          "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-26599"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2500",
          "url": "https://access.redhat.com/errata/RHSA-2025:2500"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2502",
          "url": "https://access.redhat.com/errata/RHSA-2025:2502"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2861",
          "url": "https://access.redhat.com/errata/RHSA-2025:2861"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2862",
          "url": "https://access.redhat.com/errata/RHSA-2025:2862"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2865",
          "url": "https://access.redhat.com/errata/RHSA-2025:2865"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2866",
          "url": "https://access.redhat.com/errata/RHSA-2025:2866"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2873",
          "url": "https://access.redhat.com/errata/RHSA-2025:2873"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2874",
          "url": "https://access.redhat.com/errata/RHSA-2025:2874"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2875",
          "url": "https://access.redhat.com/errata/RHSA-2025:2875"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2879",
          "url": "https://access.redhat.com/errata/RHSA-2025:2879"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:2880",
          "url": "https://access.redhat.com/errata/RHSA-2025:2880"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7163",
          "url": "https://access.redhat.com/errata/RHSA-2025:7163"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7165",
          "url": "https://access.redhat.com/errata/RHSA-2025:7165"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2025:7458",
          "url": "https://access.redhat.com/errata/RHSA-2025:7458"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-26599",
          "url": "https://access.redhat.com/security/cve/CVE-2025-26599"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2345253",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345253"
        }
      ],
      "release_date": "2025-02-25T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:tigervnc-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-icons-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-license-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-applet-0:1.8.0-33.0.7.el7_9.tuxcare.els1.noarch",
            "Oracle-Linux-7:tigervnc-server-minimal-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:tigervnc-server-module-0:1.8.0-33.0.7.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}