SB2025061745 - SUSE update for xorg-x11-server
Published: June 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2025-49175)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition in X Rendering extension (Animated cursors). A local user can trigger an out-of-bounds read error and read contents of memory on the system.
2) Integer overflow (CVE-ID: CVE-2025-49176)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Big Requests Extension. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
3) Information disclosure (CVE-ID: CVE-2025-49177)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode). A local user can gain access to sensitive information.
4) Resource management error (CVE-ID: CVE-2025-49178)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application when handling client requests. A local user can perform a denial of service (DoS) attack.
5) Integer overflow (CVE-ID: CVE-2025-49179)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the RecordSanityCheckRegisterClients() function in in X Record extension. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
6) Integer overflow (CVE-ID: CVE-2025-49180)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the RRChangeProviderProperty() function in RandR extension. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.