Package "xserver-xorg-core"
Name: |
xserver-xorg-core
|
Description: |
Xorg X server - core server
|
Latest version: |
2:21.1.4-2ubuntu1.7~22.04.13 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Head package: |
xorg-server |
Homepage: |
https://www.x.org/ |
Links
Download "xserver-xorg-core"
Other versions of "xserver-xorg-core" in Jammy
Changelog
xorg-server (2:21.1.4-2ubuntu1.7~22.04.13) jammy-security; urgency=medium
* SECURITY UPDATE: Use-after-free of the root cursor
- debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
in dix/dispatch.c.
- debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
in dix/main.c.
- CVE-2025-26594
* SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
- debian/patches/CVE-2025-26595.patch: fix bounds check in
xkb/xkbtext.c.
- CVE-2025-26595
* SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
- debian/patches/CVE-2025-26596.patch: fix computation of
XkbSizeKeySyms in xkb/xkb.c.
- CVE-2025-26596
* SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
- debian/patches/CVE-2025-26597.patch: also resize key actions in
xkb/XKBMisc.c.
- CVE-2025-26597
* SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
- debian/patches/CVE-2025-26598.patch: fix barrier device search in
Xi/xibarriers.c.
- CVE-2025-26598
* SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
- debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
composite/compalloc.c.
- debian/patches/CVE-2025-26599-2.patch: initialize border clip even
when pixmap alloc fails in composite/compalloc.c.
- CVE-2025-26599
* SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
- debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
device on removal in dix/devices.c.
- CVE-2025-26600
* SECURITY UPDATE: Use-after-free in SyncInitTrigger()
- debian/patches/CVE-2025-26601-1.patch: do not let sync objects
uninitialized in Xext/sync.c.
- debian/patches/CVE-2025-26601-2.patch: check values before applying
changes in Xext/sync.c.
- debian/patches/CVE-2025-26601-3.patch: do not fail
SyncAddTriggerToSyncObject() in Xext/sync.c.
- debian/patches/CVE-2025-26601-4.patch: apply changes last in
SyncChangeAlarmAttributes() in Xext/sync.c.
- CVE-2025-26601
-- Marc Deslauriers <email address hidden> Wed, 19 Feb 2025 08:46:37 -0500
|
Source diff to previous version |
CVE-2025-26594 |
A use-after-free flaw was found in X.Org and Xwayland. The root cursor ... |
CVE-2025-26595 |
A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ... |
CVE-2025-26596 |
A heap overflow flaw was found in X.Org and Xwayland. The computation ... |
CVE-2025-26597 |
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ... |
CVE-2025-26598 |
An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ... |
CVE-2025-26599 |
An access to an uninitialized pointer flaw was found in X.Org and Xway ... |
CVE-2025-26600 |
A use-after-free flaw was found in X.Org and Xwayland. When a device i ... |
CVE-2025-26601 |
A use-after-free flaw was found in X.Org and Xwayland. When changing a ... |
|
xorg-server (2:21.1.4-2ubuntu1.7~22.04.12) jammy-security; urgency=medium
* SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
- debian/patches/CVE-2024-9632.patch: properly update size in
xkb/xkb.c.
- CVE-2024-9632
-- Marc Deslauriers <email address hidden> Fri, 11 Oct 2024 10:23:05 -0400
|
Source diff to previous version |
CVE-2024-9632 |
A flaw was found in the X.org server. Due to improperly tracked alloca ... |
|
xorg-server (2:21.1.4-2ubuntu1.7~22.04.11) jammy; urgency=medium
* d/p/fix-suspend-resume-with-no-input-device.patch (LP: #2056331)
- Make sure info->active and info->vt_active are false
after dropping drm master.
- Normally, this is done when pausing the first
input device, so it breaks when there are no
input device at all.
-- Talha Can Havadar <email address hidden> Fri, 12 Apr 2024 16:23:18 +0200
|
Source diff to previous version |
2056331 |
[SRU] fix suspend/resume when there are no input devices |
|
xorg-server (2:21.1.4-2ubuntu1.7~22.04.10) jammy-security; urgency=medium
* SECURITY REGRESSION: Avoid possible double-free
- debian/patches/CVE-2024-31083-regression.patch:
fix a regression caused for a double-free at the last
changes fixed by CVE-2024-31083 (LP: #2060354)
-- Leonidas Da Silva Barbosa <email address hidden> Tue, 09 Apr 2024 00:18:52 -0300
|
Source diff to previous version |
|
xorg-server (2:21.1.4-2ubuntu1.7~22.04.9) jammy-security; urgency=medium
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31080.patch: fixes byte
swapping in replies in Xi/xiselectev.c.
- CVE-2024-31080
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31081.patch: fixes byte
swapping in replies in Xi/xipassivegrab.c.
- CVE-2024-31081
* SECURITY UPDATE: Heap buffer over read
- debian/patches/CVE-2024-31082.patch: makes
ProcAppleDRICreatePixmap use unswapped length to
send reply in hw/xquartz/xpr/appledir.c.
- CVE-2024-31082
* SECURITY UPDATE: User-after-free
- debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
during ProcRenderAddGlyphs in render/glyph.c.
- CVE-2024-31083
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 01 Apr 2024 17:24:38 -0300
|
CVE-2024-31080 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31081 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31082 |
A heap-based buffer over-read vulnerability was found in the X.org ser ... |
CVE-2024-31083 |
User-after-free in ProcRenderAddGlyphs |
|
About
-
Send Feedback to @ubuntu_updates