SUSE update for xorg-x11-server



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
CWE-ID CWE-416
CWE-190
Exploitation vector Local
Public exploit N/A
Vulnerable software
Basesystem Module
Operating systems & Components / Operating system

Development Tools Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

xorg-x11-server-sdk
Operating systems & Components / Operating system package or component

xorg-x11-server-Xvfb
Operating systems & Components / Operating system package or component

xorg-x11-server-extra-debuginfo
Operating systems & Components / Operating system package or component

xorg-x11-server
Operating systems & Components / Operating system package or component

xorg-x11-server-extra
Operating systems & Components / Operating system package or component

xorg-x11-server-debuginfo
Operating systems & Components / Operating system package or component

xorg-x11-server-Xvfb-debuginfo
Operating systems & Components / Operating system package or component

xorg-x11-server-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU117710

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-62229

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error during XPresentNotify structures creation when processing and adding the notifications after presenting a pixmap. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges. 

Mitigation

Update the affected package xorg-x11-server to the latest version.

Vulnerable software versions

Basesystem Module: 15-SP7

Development Tools Module: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

SUSE Linux Enterprise Desktop 15: SP7

xorg-x11-server-sdk: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb: before 21.1.15-150700.5.11.1

xorg-x11-server-extra-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server: before 21.1.15-150700.5.11.1

xorg-x11-server-extra: before 21.1.15-150700.5.11.1

xorg-x11-server-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-debugsource: before 21.1.15-150700.5.11.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU117711

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-62230

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the XkbRemoveResourceClient() function when removing Xkb resources for the client. A local user can execute arbitrary code with elevated privileges. 

Mitigation

Update the affected package xorg-x11-server to the latest version.

Vulnerable software versions

Basesystem Module: 15-SP7

Development Tools Module: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

SUSE Linux Enterprise Desktop 15: SP7

xorg-x11-server-sdk: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb: before 21.1.15-150700.5.11.1

xorg-x11-server-extra-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server: before 21.1.15-150700.5.11.1

xorg-x11-server-extra: before 21.1.15-150700.5.11.1

xorg-x11-server-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-debugsource: before 21.1.15-150700.5.11.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Integer overflow

EUVDB-ID: #VU117712

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-62231

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the Xkb extension XkbSetCompatMap(). A local user can trigger an integer overflow and execute arbitrary code on the target system.

Mitigation

Update the affected package xorg-x11-server to the latest version.

Vulnerable software versions

Basesystem Module: 15-SP7

Development Tools Module: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

SUSE Linux Enterprise Desktop 15: SP7

xorg-x11-server-sdk: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb: before 21.1.15-150700.5.11.1

xorg-x11-server-extra-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server: before 21.1.15-150700.5.11.1

xorg-x11-server-extra: before 21.1.15-150700.5.11.1

xorg-x11-server-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-Xvfb-debuginfo: before 21.1.15-150700.5.11.1

xorg-x11-server-debugsource: before 21.1.15-150700.5.11.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20253865-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###