<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xorg-x11-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20198-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-11T11:25:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-11T11:25:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-11T11:25:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xorg-x11-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xorg-x11-server fixes the following issues:

- CVE-2025-62229: Fixed use-after-free in XPresentNotify structures creation (bsc#1251958).
- CVE-2025-62230: Fixed use-after-free in Xkb client resource removal (bsc#1251959).
- CVE-2025-62231: Fixed value overflow in Xkb extension XkbSetCompatMap() (bsc#1251960).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-254</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251958</URL>
      <Description>SUSE Bug 1251958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251959</URL>
      <Description>SUSE Bug 1251959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251960</URL>
      <Description>SUSE Bug 1251960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62229/</URL>
      <Description>SUSE CVE CVE-2025-62229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62230/</URL>
      <Description>SUSE CVE CVE-2025-62230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62231/</URL>
      <Description>SUSE CVE CVE-2025-62231 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-21.1.15-160000.3.1">xorg-x11-server-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-Xvfb-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-Xvfb-21.1.15-160000.3.1">xorg-x11-server-Xvfb-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-extra-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-extra-21.1.15-160000.3.1">xorg-x11-server-extra-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-sdk-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-sdk-21.1.15-160000.3.1">xorg-x11-server-sdk-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-source-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-source-21.1.15-160000.3.1">xorg-x11-server-source-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-wrapper-21.1.15-160000.3.1">
      <FullProductName ProductID="xorg-x11-server-wrapper-21.1.15-160000.3.1">xorg-x11-server-wrapper-21.1.15-160000.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xorg-x11-server-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-21.1.15-160000.3.1">xorg-x11-server-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-Xvfb-21.1.15-160000.3.1">xorg-x11-server-Xvfb-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-extra-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-extra-21.1.15-160000.3.1">xorg-x11-server-extra-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-sdk-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-sdk-21.1.15-160000.3.1">xorg-x11-server-sdk-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-source-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-source-21.1.15-160000.3.1">xorg-x11-server-source-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-wrapper-21.1.15-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:xorg-x11-server-wrapper-21.1.15-160000.3.1">xorg-x11-server-wrapper-21.1.15-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-62229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-Xvfb-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-extra-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-sdk-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-source-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-wrapper-21.1.15-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62229.html</URL>
        <Description>CVE-2025-62229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251958</URL>
        <Description>SUSE Bug 1251958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was discovered in the X.Org X server's X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.</Note>
    </Notes>
    <CVE>CVE-2025-62230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-Xvfb-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-extra-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-sdk-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-source-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-wrapper-21.1.15-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62230.html</URL>
        <Description>CVE-2025-62230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251959</URL>
        <Description>SUSE Bug 1251959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was identified in the X.Org X server's X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.</Note>
    </Notes>
    <CVE>CVE-2025-62231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-Xvfb-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-extra-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-sdk-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-source-21.1.15-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:xorg-x11-server-wrapper-21.1.15-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62231.html</URL>
        <Description>CVE-2025-62231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251960</URL>
        <Description>SUSE Bug 1251960</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
