UbuntuUpdates.org

Package "xwayland"

Name: xwayland

Description:

X server for running X clients under Wayland

Latest version: 2:22.1.1-1ubuntu0.17
Release: jammy (22.04)
Level: security
Repository: main
Homepage: https://www.x.org/

Links


Download "xwayland"


Other versions of "xwayland" in Jammy

Repository Area Version
base main 2:22.1.1-1
updates main 2:22.1.1-1ubuntu0.17
proposed main 2:22.1.1-1ubuntu0.16

Changelog

Version: 2:22.1.1-1ubuntu0.17 2025-02-25 20:06:57 UTC

  xwayland (2:22.1.1-1ubuntu0.17) jammy-security; urgency=medium

  * SECURITY UPDATE: Use-after-free of the root cursor
    - debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
      in dix/dispatch.c.
    - debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
      in dix/main.c.
    - CVE-2025-26594
  * SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
    - debian/patches/CVE-2025-26595.patch: fix bounds check in
      xkb/xkbtext.c.
    - CVE-2025-26595
  * SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
    - debian/patches/CVE-2025-26596.patch: fix computation of
      XkbSizeKeySyms in xkb/xkb.c.
    - CVE-2025-26596
  * SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
    - debian/patches/CVE-2025-26597.patch: also resize key actions in
      xkb/XKBMisc.c.
    - CVE-2025-26597
  * SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
    - debian/patches/CVE-2025-26598.patch: fix barrier device search in
      Xi/xibarriers.c.
    - CVE-2025-26598
  * SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
    - debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
      composite/compalloc.c.
    - debian/patches/CVE-2025-26599-2.patch: initialize border clip even
      when pixmap alloc fails in composite/compalloc.c.
    - CVE-2025-26599
  * SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
    - debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
      device on removal in dix/devices.c.
    - CVE-2025-26600
  * SECURITY UPDATE: Use-after-free in SyncInitTrigger()
    - debian/patches/CVE-2025-26601-1.patch: do not let sync objects
      uninitialized in Xext/sync.c.
    - debian/patches/CVE-2025-26601-2.patch: check values before applying
      changes in Xext/sync.c.
    - debian/patches/CVE-2025-26601-3.patch: do not fail
      SyncAddTriggerToSyncObject() in Xext/sync.c.
    - debian/patches/CVE-2025-26601-4.patch: apply changes last in
      SyncChangeAlarmAttributes() in Xext/sync.c.
    - CVE-2025-26601
  * Note: this package does _not_ contain the changes from
    (2:22.1.1-1ubuntu0.16) in jammy-proposed.

 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2025 10:05:45 -0500

Source diff to previous version
CVE-2025-26594 A use-after-free flaw was found in X.Org and Xwayland. The root cursor ...
CVE-2025-26595 A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ...
CVE-2025-26596 A heap overflow flaw was found in X.Org and Xwayland. The computation ...
CVE-2025-26597 A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ...
CVE-2025-26598 An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ...
CVE-2025-26599 An access to an uninitialized pointer flaw was found in X.Org and Xway ...
CVE-2025-26600 A use-after-free flaw was found in X.Org and Xwayland. When a device i ...
CVE-2025-26601 A use-after-free flaw was found in X.Org and Xwayland. When changing a ...

Version: 2:22.1.1-1ubuntu0.14 2024-10-30 11:07:03 UTC

  xwayland (2:22.1.1-1ubuntu0.14) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
    - debian/patches/CVE-2024-9632.patch: properly update size in
      xkb/xkb.c.
    - CVE-2024-9632

 -- Marc Deslauriers <email address hidden> Fri, 11 Oct 2024 10:40:32 -0400

Source diff to previous version
CVE-2024-9632 A flaw was found in the X.org server. Due to improperly tracked alloca ...

Version: 2:22.1.1-1ubuntu0.13 2024-04-09 23:06:54 UTC

  xwayland (2:22.1.1-1ubuntu0.13) jammy-security; urgency=medium

  * SECURITY REGRESSION: Avoid possible double-free
    - debian/patches/CVE-2024-31083-regression.patch:
      fix a regression caused for a double-free at the last
      changes fixed by CVE-2024-31083 (LP: #2060354)

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 08 Apr 2024 22:13:22 -0300

Source diff to previous version
CVE-2024-31083 User-after-free in ProcRenderAddGlyphs

Version: 2:22.1.1-1ubuntu0.12 2024-04-06 17:06:52 UTC

  xwayland (2:22.1.1-1ubuntu0.12) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap buffer over read
    - debian/patches/CVE-2024-31080.patch: fixes byte
      swapping in replies in Xi/xiselectev.c.
    - CVE-2024-31080
  * SECURITY UPDATE: Heap buffer over read
    - debian/patches/CVE-2024-31081.patch: fixes byte
      swapping in replies in Xi/xipassivegrab.c.
    - CVE-2024-31081
  * SECURITY UPDATE: User-after-free
    - debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
      during ProcRenderAddGlyphs in render/glyph.c.
    - CVE-2024-31083

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 02 Apr 2024 14:08:05 -0300

Source diff to previous version
CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org ser ...
CVE-2024-31081 A heap-based buffer over-read vulnerability was found in the X.org ser ...
CVE-2024-31083 User-after-free in ProcRenderAddGlyphs

Version: 2:22.1.1-1ubuntu0.11 2024-01-30 15:08:40 UTC

  xwayland (2:22.1.1-1ubuntu0.11) jammy-security; urgency=medium

  * SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
    - debian/patches/CVE-2024-21886-3.patch: fix use after free in input
      device shutdown in dix/devices.c.

 -- Marc Deslauriers <email address hidden> Mon, 29 Jan 2024 07:51:17 -0500

CVE-2024-21886 Heap buffer overflow in DisableDevice



About   -   Send Feedback to @ubuntu_updates