Package "xserver-xephyr"
  
    
    
        | Name: | xserver-xephyr | 
    
        | Description:
 | nested X server | 
    
        | Latest version: | 2:21.1.4-2ubuntu1.7~22.04.16 | 
    
        | Release: | jammy (22.04) | 
    
        | Level: | security | 
    
        | Repository: | main | 
         
            | Head package: | xorg-server | 
        
            | Homepage: | https://www.x.org/ | 
    
   
  
  
 
Links
    Download "xserver-xephyr"
    
Other versions of "xserver-xephyr" in Jammy
    
Changelog
    
    
    
        
        
    
    
        |   xorg-server (2:21.1.4-2ubuntu1.7~22.04.16) jammy-security; urgency=medium   * SECURITY UPDATE: Use-after-free in XPresentNotify structures creation
- debian/patches/CVE-2025-62229.patch: fix use-after-free in
 present/present_notify.c.
 - CVE-2025-62229
 * SECURITY UPDATE: Use-after-free in Xkb client resource removal
 - debian/patches/CVE-2025-62230-1.patch: make the RT_XKBCLIENT resource
 private in xkb/xkb.c, include/xkbsrv.h.
 - debian/patches/CVE-2025-62230-2.patch: free the XKB resource when
 freeing XkbInterest in xkb/xkbEvents.c.
 - CVE-2025-62230
 * SECURITY UPDATE: Value overflow in Xkb extension XkbSetCompatMap()
 - debian/patches/CVE-2025-62231.patch: prevent overflow in xkb/xkb.c.
 - CVE-2025-62231
  -- Marc Deslauriers <email address hidden>  Thu, 23 Oct 2025 13:47:20 -0400 | 
    | Source diff to previous version | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:21.1.4-2ubuntu1.7~22.04.15) jammy-security; urgency=medium   * SECURITY UPDATE: Out-of-bounds access in X Rendering extension
- debian/patches/CVE-2025-49175.patch: avoid 0 or less animated cursors
 in render/animcur.c, render/render.c.
 - CVE-2025-49175
 * SECURITY UPDATE: Integer overflow in Big Requests Extension
 - debian/patches/CVE-2025-49176.patch: do not overflow the integer size
 with BigRequest in dix/dispatch.c, os/io.c.
 - CVE-2025-49176
 * SECURITY UPDATE: Data leak in XFIXES Extension 6
 - debian/patches/CVE-2025-49177.patch: check request length for
 SetClientDisconnectMode in xfixes/disconnect.c.
 - CVE-2025-49177
 * SECURITY UPDATE: Unprocessed client request via bytes to ignore
 - debian/patches/CVE-2025-49178.patch: account for bytes to ignore when
 sharing input buffer in os/io.c.
 - CVE-2025-49178
 * SECURITY UPDATE: Integer overflow in X Record extension
 - debian/patches/CVE-2025-49179.patch: check for overflow in
 RecordSanityCheckRegisterClients() in record/record.c.
 - CVE-2025-49179
 * SECURITY UPDATE: Integer overflow in RandR extension
 - debian/patches/CVE-2025-49180-1.patch: check for overflow in
 RRChangeProviderProperty() in randr/rrproviderproperty.c.
 - debian/patches/CVE-2025-49180-2.patch: check for RandR provider
 functions in hw/xfree86/modes/xf86RandR12.c.
 - CVE-2025-49180
  -- Marc Deslauriers <email address hidden>  Tue, 10 Jun 2025 14:21:45 -0400 | 
    | Source diff to previous version | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:21.1.4-2ubuntu1.7~22.04.13) jammy-security; urgency=medium   * SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
 in dix/dispatch.c.
 - debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
 in dix/main.c.
 - CVE-2025-26594
 * SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
 - debian/patches/CVE-2025-26595.patch: fix bounds check in
 xkb/xkbtext.c.
 - CVE-2025-26595
 * SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
 - debian/patches/CVE-2025-26596.patch: fix computation of
 XkbSizeKeySyms in xkb/xkb.c.
 - CVE-2025-26596
 * SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
 - debian/patches/CVE-2025-26597.patch: also resize key actions in
 xkb/XKBMisc.c.
 - CVE-2025-26597
 * SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
 - debian/patches/CVE-2025-26598.patch: fix barrier device search in
 Xi/xibarriers.c.
 - CVE-2025-26598
 * SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
 - debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
 composite/compalloc.c.
 - debian/patches/CVE-2025-26599-2.patch: initialize border clip even
 when pixmap alloc fails in composite/compalloc.c.
 - CVE-2025-26599
 * SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
 - debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
 device on removal in dix/devices.c.
 - CVE-2025-26600
 * SECURITY UPDATE: Use-after-free in SyncInitTrigger()
 - debian/patches/CVE-2025-26601-1.patch: do not let sync objects
 uninitialized in Xext/sync.c.
 - debian/patches/CVE-2025-26601-2.patch: check values before applying
 changes in Xext/sync.c.
 - debian/patches/CVE-2025-26601-3.patch: do not fail
 SyncAddTriggerToSyncObject() in Xext/sync.c.
 - debian/patches/CVE-2025-26601-4.patch: apply changes last in
 SyncChangeAlarmAttributes() in Xext/sync.c.
 - CVE-2025-26601
  -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2025 08:46:37 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-26594 | A use-after-free flaw was found in X.Org and Xwayland. The root cursor ... |  
                | CVE-2025-26595 | A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ... |  
                | CVE-2025-26596 | A heap overflow flaw was found in X.Org and Xwayland. The computation  ... |  
                | CVE-2025-26597 | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ... |  
                | CVE-2025-26598 | An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ... |  
                | CVE-2025-26599 | An access to an uninitialized pointer flaw was found in X.Org and Xway ... |  
                | CVE-2025-26600 | A use-after-free flaw was found in X.Org and Xwayland. When a device i ... |  
                | CVE-2025-26601 | A use-after-free flaw was found in X.Org and Xwayland. When changing a ... |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:21.1.4-2ubuntu1.7~22.04.12) jammy-security; urgency=medium   * SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
- debian/patches/CVE-2024-9632.patch: properly update size in
 xkb/xkb.c.
 - CVE-2024-9632
  -- Marc Deslauriers <email address hidden>  Fri, 11 Oct 2024 10:23:05 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2024-9632 | A flaw was found in the X.org server. Due to improperly tracked alloca ... |  | 
    
    
    
    
    
        
        
    
    
        |   xorg-server (2:21.1.4-2ubuntu1.7~22.04.10) jammy-security; urgency=medium   * SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
 fix a regression caused for a double-free at the last
 changes fixed by CVE-2024-31083 (LP: #2060354)
  -- Leonidas Da Silva Barbosa <email address hidden>  Tue, 09 Apr 2024 00:18:52 -0300 | 
    
        
        |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates