Package "xorg-server"
Name: |
xorg-server
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- distributed multihead X server
- Distributed Multihead X tools
- Nested X server
- Xorg X server - source files
|
Latest version: |
2:1.20.13-1ubuntu1~20.04.19 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "xorg-server" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
xorg-server (2:1.20.13-1ubuntu1~20.04.19) focal-security; urgency=medium
* SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
in dix/dispatch.c.
- debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
in dix/main.c.
- CVE-2025-26594
* SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
- debian/patches/CVE-2025-26595.patch: fix bounds check in
xkb/xkbtext.c.
- CVE-2025-26595
* SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
- debian/patches/CVE-2025-26596.patch: fix computation of
XkbSizeKeySyms in xkb/xkb.c.
- CVE-2025-26596
* SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
- debian/patches/CVE-2025-26597.patch: also resize key actions in
xkb/XKBMisc.c.
- CVE-2025-26597
* SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
- debian/patches/CVE-2025-26598.patch: fix barrier device search in
Xi/xibarriers.c.
- CVE-2025-26598
* SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
- debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
composite/compalloc.c.
- debian/patches/CVE-2025-26599-2.patch: initialize border clip even
when pixmap alloc fails in composite/compalloc.c.
- CVE-2025-26599
* SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
- debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
device on removal in dix/devices.c.
- CVE-2025-26600
* SECURITY UPDATE: Use-after-free in SyncInitTrigger()
- debian/patches/CVE-2025-26601-1.patch: do not let sync objects
uninitialized in Xext/sync.c.
- debian/patches/CVE-2025-26601-2.patch: check values before applying
changes in Xext/sync.c.
- debian/patches/CVE-2025-26601-3.patch: do not fail
SyncAddTriggerToSyncObject() in Xext/sync.c.
- debian/patches/CVE-2025-26601-4.patch: apply changes last in
SyncChangeAlarmAttributes() in Xext/sync.c.
- CVE-2025-26601
-- Marc Deslauriers <email address hidden> Wed, 19 Feb 2025 08:54:27 -0500
|
Source diff to previous version |
CVE-2025-26594 |
A use-after-free flaw was found in X.Org and Xwayland. The root cursor ... |
CVE-2025-26595 |
A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ... |
CVE-2025-26596 |
A heap overflow flaw was found in X.Org and Xwayland. The computation ... |
CVE-2025-26597 |
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ... |
CVE-2025-26598 |
An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ... |
CVE-2025-26599 |
An access to an uninitialized pointer flaw was found in X.Org and Xway ... |
CVE-2025-26600 |
A use-after-free flaw was found in X.Org and Xwayland. When a device i ... |
CVE-2025-26601 |
A use-after-free flaw was found in X.Org and Xwayland. When changing a ... |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.18) focal-security; urgency=medium
* SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
- debian/patches/CVE-2024-9632.patch: properly update size in
xkb/xkb.c.
- CVE-2024-9632
-- Marc Deslauriers <email address hidden> Fri, 11 Oct 2024 10:23:55 -0400
|
Source diff to previous version |
CVE-2024-9632 |
A flaw was found in the X.org server. Due to improperly tracked alloca ... |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium
* SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
fix a regression caused for a double-free at the last
changes fixed by CVE-2024-31083 (LP: #2060354)
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 08 Apr 2024 22:36:10 -0300
|
Source diff to previous version |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
swapping in replies in Xi/xiselectev.c.
- CVE-2024-31080
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31081.patch: fixes byte
swapping in replies in Xi/xipassivegrab.c.
- CVE-2024-31081
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31082.patch: makes
ProcAppleDRICreatePixmap use unswapped length to
send reply in hw/xquartz/xpr/appledir.c.
- CVE-2024-31082
* SECURITY UPDATE: User-after-free
- debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
during ProcRenderAddGlyphs in render/glyph.c.
- CVE-2024-31083
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 17:17:12 -0300
|
Source diff to previous version |
CVE-2024-31080 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31081 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31082 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31083 |
User-after-free in ProcRenderAddGlyphs |
|
xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium
* SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
- debian/patches/CVE-2024-21886-3.patch: fix use after free in input
device shutdown in dix/devices.c.
-- Marc Deslauriers <email address hidden> Mon, 29 Jan 2024 07:44:21 -0500
|
|
About
-
Send Feedback to @ubuntu_updates