Package "xserver-xorg-core"
  
    
    
        | Name: | xserver-xorg-core | 
    
        | Description:
 | Xorg X server - core server | 
    
        | Latest version: | 2:1.20.13-1ubuntu1~20.04.20 | 
    
        | Release: | focal (20.04) | 
    
        | Level: | updates | 
    
        | Repository: | main | 
         
            | Head package: | xorg-server | 
        
            | Homepage: | https://www.x.org/ | 
    
   
  
  
 
Links
    Download "xserver-xorg-core"
    
Other versions of "xserver-xorg-core" in Focal
    
Changelog
    
    
    
        
        
    
    
        |   xorg-server (2:1.20.13-1ubuntu1~20.04.20) focal; urgency=medium   * If a client application has not called DRI2ScreenInit(),
DRI2Authenticate() and DRI2CreateDrawable2() cause the X server to
 crash. This patch adds some sanity checks to ensure the X server
 stays running. (LP: #1861609)
 - d/p/lp1861609-dri2-Protect-against-dri2ClientPrivate-assertio.patch
  -- Matthew Ruffell <email address hidden>  Tue, 04 Mar 2025 18:35:23 +1300 | 
    | Source diff to previous version | 
        
        | 
                
                | 1861609 | Xorg crashes with assertion failure at dixGetPrivateAddr: Assertion `key-\u003einitialized' failed |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:1.20.13-1ubuntu1~20.04.19) focal-security; urgency=medium   * SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
 in dix/dispatch.c.
 - debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
 in dix/main.c.
 - CVE-2025-26594
 * SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
 - debian/patches/CVE-2025-26595.patch: fix bounds check in
 xkb/xkbtext.c.
 - CVE-2025-26595
 * SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
 - debian/patches/CVE-2025-26596.patch: fix computation of
 XkbSizeKeySyms in xkb/xkb.c.
 - CVE-2025-26596
 * SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
 - debian/patches/CVE-2025-26597.patch: also resize key actions in
 xkb/XKBMisc.c.
 - CVE-2025-26597
 * SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
 - debian/patches/CVE-2025-26598.patch: fix barrier device search in
 Xi/xibarriers.c.
 - CVE-2025-26598
 * SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
 - debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
 composite/compalloc.c.
 - debian/patches/CVE-2025-26599-2.patch: initialize border clip even
 when pixmap alloc fails in composite/compalloc.c.
 - CVE-2025-26599
 * SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
 - debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
 device on removal in dix/devices.c.
 - CVE-2025-26600
 * SECURITY UPDATE: Use-after-free in SyncInitTrigger()
 - debian/patches/CVE-2025-26601-1.patch: do not let sync objects
 uninitialized in Xext/sync.c.
 - debian/patches/CVE-2025-26601-2.patch: check values before applying
 changes in Xext/sync.c.
 - debian/patches/CVE-2025-26601-3.patch: do not fail
 SyncAddTriggerToSyncObject() in Xext/sync.c.
 - debian/patches/CVE-2025-26601-4.patch: apply changes last in
 SyncChangeAlarmAttributes() in Xext/sync.c.
 - CVE-2025-26601
  -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2025 08:54:27 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-26594 | A use-after-free flaw was found in X.Org and Xwayland. The root cursor ... |  
                | CVE-2025-26595 | A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ... |  
                | CVE-2025-26596 | A heap overflow flaw was found in X.Org and Xwayland. The computation  ... |  
                | CVE-2025-26597 | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ... |  
                | CVE-2025-26598 | An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ... |  
                | CVE-2025-26599 | An access to an uninitialized pointer flaw was found in X.Org and Xway ... |  
                | CVE-2025-26600 | A use-after-free flaw was found in X.Org and Xwayland. When a device i ... |  
                | CVE-2025-26601 | A use-after-free flaw was found in X.Org and Xwayland. When changing a ... |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:1.20.13-1ubuntu1~20.04.18) focal-security; urgency=medium   * SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
- debian/patches/CVE-2024-9632.patch: properly update size in
 xkb/xkb.c.
 - CVE-2024-9632
  -- Marc Deslauriers <email address hidden>  Fri, 11 Oct 2024 10:23:55 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2024-9632 | A flaw was found in the X.org server. Due to improperly tracked alloca ... |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium   * SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
 fix a regression caused for a double-free at the last
 changes fixed by CVE-2024-31083 (LP: #2060354)
  -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 08 Apr 2024 22:36:10 -0300 | 
    | Source diff to previous version | 
        
        |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium   * SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
 swapping in replies in Xi/xiselectev.c.
 - CVE-2024-31080
 * SECURITY UPDATE: Heap buffer over read
 - debian/patches/CVE-2024-31081.patch: fixes byte
 swapping in replies in Xi/xipassivegrab.c.
 - CVE-2024-31081
 * SECURITY UPDATE: Heap buffer over read
 - debian/patches/CVE-2024-31082.patch: makes
 ProcAppleDRICreatePixmap use unswapped length to
 send reply in hw/xquartz/xpr/appledir.c.
 - CVE-2024-31082
 * SECURITY UPDATE: User-after-free
 - debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
 during ProcRenderAddGlyphs in render/glyph.c.
 - CVE-2024-31083
  -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 01 Apr 2024 17:17:12 -0300 | 
    
        
        | 
                
                | CVE-2024-31080 | A heap-based buffer over-read vulnerability was found in the X.org ser ... |  
                | CVE-2024-31081 | A heap-based buffer over-read vulnerability was found in the X.org ser ... |  
                | CVE-2024-31082 | A heap-based buffer over-read vulnerability was found in the X.org ser ... |  
                | CVE-2024-31083 | User-after-free in ProcRenderAddGlyphs |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates