<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xorg-x11-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:3865-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-30T13:40:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-30T13:40:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-30T13:40:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xorg-x11-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xorg-x11-server fixes the following issues:

  - Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958)
  - Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959)
  - Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/kiosk/xorg:latest-2025-3865,SUSE-2025-3865,SUSE-SLE-Module-Basesystem-15-SP7-2025-3865,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3865</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/</URL>
      <Description>Link for SUSE-SU-2025:3865-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:3865-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251958</URL>
      <Description>SUSE Bug 1251958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251959</URL>
      <Description>SUSE Bug 1251959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251960</URL>
      <Description>SUSE Bug 1251960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62229/</URL>
      <Description>SUSE CVE CVE-2025-62229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62230/</URL>
      <Description>SUSE CVE CVE-2025-62230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62231/</URL>
      <Description>SUSE CVE CVE-2025-62231 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/kiosk/xorg:latest">
      <Branch Type="Product Name" Name="Container suse/kiosk/xorg:latest">
        <FullProductName ProductID="Container suse/kiosk/xorg:latest">Container suse/kiosk/xorg:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7" CPE="cpe:/o:suse:sle-module-basesystem:15:sp7">SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7" CPE="cpe:/o:suse:sle-module-development-tools:15:sp7">SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-21.1.15-150700.5.11.1">
      <FullProductName ProductID="xorg-x11-server-21.1.15-150700.5.11.1">xorg-x11-server-21.1.15-150700.5.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-Xvfb-21.1.15-150700.5.11.1">
      <FullProductName ProductID="xorg-x11-server-Xvfb-21.1.15-150700.5.11.1">xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-extra-21.1.15-150700.5.11.1">
      <FullProductName ProductID="xorg-x11-server-extra-21.1.15-150700.5.11.1">xorg-x11-server-extra-21.1.15-150700.5.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-sdk-21.1.15-150700.5.11.1">
      <FullProductName ProductID="xorg-x11-server-sdk-21.1.15-150700.5.11.1">xorg-x11-server-sdk-21.1.15-150700.5.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-source-21.1.15-150700.5.11.1">
      <FullProductName ProductID="xorg-x11-server-source-21.1.15-150700.5.11.1">xorg-x11-server-source-21.1.15-150700.5.11.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xorg-x11-server-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/kiosk/xorg:latest">
      <FullProductName ProductID="Container suse/kiosk/xorg:latest:xorg-x11-server-21.1.15-150700.5.11.1">xorg-x11-server-21.1.15-150700.5.11.1 as a component of Container suse/kiosk/xorg:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/kiosk/xorg:latest">
      <FullProductName ProductID="Container suse/kiosk/xorg:latest:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1">xorg-x11-server-Xvfb-21.1.15-150700.5.11.1 as a component of Container suse/kiosk/xorg:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1">xorg-x11-server-21.1.15-150700.5.11.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1">xorg-x11-server-Xvfb-21.1.15-150700.5.11.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-extra-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1">xorg-x11-server-extra-21.1.15-150700.5.11.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-sdk-21.1.15-150700.5.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1">xorg-x11-server-sdk-21.1.15-150700.5.11.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-62229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62229.html</URL>
        <Description>CVE-2025-62229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251958</URL>
        <Description>SUSE Bug 1251958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was discovered in the X.Org X server's X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.</Note>
    </Notes>
    <CVE>CVE-2025-62230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62230.html</URL>
        <Description>CVE-2025-62230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251959</URL>
        <Description>SUSE Bug 1251959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was identified in the X.Org X server's X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.</Note>
    </Notes>
    <CVE>CVE-2025-62231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>Container suse/kiosk/xorg:latest:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62231.html</URL>
        <Description>CVE-2025-62231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251960</URL>
        <Description>SUSE Bug 1251960</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
