UbuntuUpdates.org

Package "xorg-server"

Name: xorg-server

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • common files used by various X servers
  • nested X server
  • Xorg X server - core server
  • Xorg X server - development files

Latest version: 2:1.20.13-1ubuntu1~20.04.18
Release: focal (20.04)
Level: security
Repository: main

Links



Other versions of "xorg-server" in Focal

Repository Area Version
base main 2:1.20.8-2ubuntu2
base universe 2:1.20.8-2ubuntu2
security universe 2:1.20.13-1ubuntu1~20.04.18
updates main 2:1.20.13-1ubuntu1~20.04.18
updates universe 2:1.20.13-1ubuntu1~20.04.18

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:1.20.13-1ubuntu1~20.04.18 2024-10-30 11:07:00 UTC

  xorg-server (2:1.20.13-1ubuntu1~20.04.18) focal-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
    - debian/patches/CVE-2024-9632.patch: properly update size in
      xkb/xkb.c.
    - CVE-2024-9632

 -- Marc Deslauriers <email address hidden> Fri, 11 Oct 2024 10:23:55 -0400

Source diff to previous version
CVE-2024-9632 A flaw was found in the X.org server. Due to improperly tracked alloca ...

Version: 2:1.20.13-1ubuntu1~20.04.17 2024-04-09 23:06:52 UTC

  xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium

  * SECURITY REGRESSION: Avoid possible double-free
    - debian/patches/CVE-2024-31083-regression.patch:
      fix a regression caused for a double-free at the last
      changes fixed by CVE-2024-31083 (LP: #2060354)

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 08 Apr 2024 22:36:10 -0300

Source diff to previous version
CVE-2024-31083 User-after-free in ProcRenderAddGlyphs

Version: 2:1.20.13-1ubuntu1~20.04.16 2024-04-06 05:06:52 UTC

  xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium

  * SECURITY UPDATE: Heap buffer over read
    - debian/patches/CVE-2024-31080.patch: fixes byte
      swapping in replies in Xi/xiselectev.c.
    - CVE-2024-31080
  * SECURITY UPDATE: Heap buffer over read
    - debian/patches/CVE-2024-31081.patch: fixes byte
      swapping in replies in Xi/xipassivegrab.c.
    - CVE-2024-31081
  * SECURITY UPDATE: Heap buffer over read
    - debian/patches/CVE-2024-31082.patch: makes
      ProcAppleDRICreatePixmap use unswapped length to
      send reply in hw/xquartz/xpr/appledir.c.
    - CVE-2024-31082
  * SECURITY UPDATE: User-after-free
    - debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
      during ProcRenderAddGlyphs in render/glyph.c.
    - CVE-2024-31083

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 17:17:12 -0300

Source diff to previous version
CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org ser ...
CVE-2024-31081 A heap-based buffer over-read vulnerability was found in the X.org ser ...
CVE-2024-31082 A heap-based buffer over-read vulnerability was found in the X.org ser ...
CVE-2024-31083 User-after-free in ProcRenderAddGlyphs

Version: 2:1.20.13-1ubuntu1~20.04.15 2024-01-30 15:08:34 UTC

  xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium

  * SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
    - debian/patches/CVE-2024-21886-3.patch: fix use after free in input
      device shutdown in dix/devices.c.

 -- Marc Deslauriers <email address hidden> Mon, 29 Jan 2024 07:44:21 -0500

Source diff to previous version
CVE-2024-21886 Heap buffer overflow in DisableDevice

Version: 2:1.20.13-1ubuntu1~20.04.14 2024-01-16 17:07:38 UTC

  xorg-server (2:1.20.13-1ubuntu1~20.04.14) focal-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
    ProcXIQueryPointer
    - debian/patches/CVE-2023-6816.patch: allocate enough space for logical
      button maps in Xi/xiquerypointer.c, dix/enterleave.c.
    - CVE-2023-6816
  * SECURITY UPDATE: Reattaching to different master device may lead to
    out-of-bounds memory access
    - debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
      our DeviceStateNotify in dix/enterleave.c.
    - debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
      calculation in dix/enterleave.c.
    - debian/patches/CVE-2024-0229-3.patch: when creating a new
      ButtonClass, set the number of buttons in Xi/exevents.c.
    - debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
      device for XIAttachToMaster in Xi/xichangehierarchy.c.
    - CVE-2024-0229
  * SECURITY UPDATE: SELinux unlabeled GLX PBuffer
    - debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
      in glx/glxcmds.c.
    - CVE-2024-0408
  * SECURITY UPDATE: SELinux context corruption
    - debian/patches/CVE-2024-0409.patch: use the proper private key for
      cursor in hw/kdrive/ephyr/ephyrcursor.c,
      hw/xwayland/xwayland-cursor.c.
    - CVE-2024-0409
  * SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
    - debian/patches/CVE-2024-21885.patch: flush hierarchy events after
      adding/removing master devices in Xi/xichangehierarchy.c.
    - CVE-2024-21885
  * SECURITY UPDATE: Heap buffer overflow in DisableDevice
    - debian/patches/CVE-2024-21886-1.patch: do not keep linked list
      pointer during recursion in dix/devices.c.
    - debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
      disabled slaved devices too in dix/devices.c.
    - CVE-2024-21886

 -- Marc Deslauriers <email address hidden> Mon, 15 Jan 2024 10:45:41 -0500

CVE-2023-6816 Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer
CVE-2024-0229 Reattaching to different master device may lead to out-of-bounds memory access
CVE-2024-0408 SELinux unlabeled GLX PBuffer
CVE-2024-0409 SELinux context corruption
CVE-2024-21885 Heap buffer overflow in XISendDeviceHierarchyEvent
CVE-2024-21886 Heap buffer overflow in DisableDevice



About   -   Send Feedback to @ubuntu_updates