Package "xdmx"
  
    
    
        | Name: | 
        xdmx
            
         | 
    
    
         Description: | 
        
             distributed multihead X server 
         | 
    
    
        | Latest version: | 
        2:1.20.13-1ubuntu1~20.04.19 | 
    
    
        | Release: | 
        focal (20.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        universe | 
    
         
            | Head package: | 
            xorg-server | 
         
        
            | Homepage: | 
            https://www.x.org/ | 
        
    
   
  
  
 
Links
    Download "xdmx"
    
Other versions of "xdmx" in Focal
    
Changelog
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.19) focal-security; urgency=medium 
  * SECURITY UPDATE: Use-after-free of the root cursor
     - debian/patches/CVE-2025-26594-1.patch: refuse to free the root cursor
       in dix/dispatch.c.
     - debian/patches/CVE-2025-26594-2.patch: keep a ref to the rootCursor
       in dix/main.c.
     - CVE-2025-26594
   * SECURITY UPDATE: Buffer overflow in XkbVModMaskText()
     - debian/patches/CVE-2025-26595.patch: fix bounds check in
       xkb/xkbtext.c.
     - CVE-2025-26595
   * SECURITY UPDATE: Heap overflow in XkbWriteKeySyms()
     - debian/patches/CVE-2025-26596.patch: fix computation of
       XkbSizeKeySyms in xkb/xkb.c.
     - CVE-2025-26596
   * SECURITY UPDATE: Buffer overflow in XkbChangeTypesOfKey()
     - debian/patches/CVE-2025-26597.patch: also resize key actions in
       xkb/XKBMisc.c.
     - CVE-2025-26597
   * SECURITY UPDATE: Out-of-bounds write in CreatePointerBarrierClient()
     - debian/patches/CVE-2025-26598.patch: fix barrier device search in
       Xi/xibarriers.c.
     - CVE-2025-26598
   * SECURITY UPDATE: Use of uninitialized pointer in compRedirectWindow()
     - debian/patches/CVE-2025-26599-1.patch: handle failure to redirect in
       composite/compalloc.c.
     - debian/patches/CVE-2025-26599-2.patch: initialize border clip even
       when pixmap alloc fails in composite/compalloc.c.
     - CVE-2025-26599
   * SECURITY UPDATE: Use-after-free in PlayReleasedEvents()
     - debian/patches/CVE-2025-26600.patch: dequeue pending events on frozen
       device on removal in dix/devices.c.
     - CVE-2025-26600
   * SECURITY UPDATE: Use-after-free in SyncInitTrigger()
     - debian/patches/CVE-2025-26601-1.patch: do not let sync objects
       uninitialized in Xext/sync.c.
     - debian/patches/CVE-2025-26601-2.patch: check values before applying
       changes in Xext/sync.c.
     - debian/patches/CVE-2025-26601-3.patch: do not fail
       SyncAddTriggerToSyncObject() in Xext/sync.c.
     - debian/patches/CVE-2025-26601-4.patch: apply changes last in
       SyncChangeAlarmAttributes() in Xext/sync.c.
     - CVE-2025-26601 
 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2025 08:54:27 -0500 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-26594 | 
                A use-after-free flaw was found in X.Org and Xwayland. The root cursor ... | 
                 
                
                | CVE-2025-26595 | 
                A buffer overflow flaw was found in X.Org and Xwayland. The code in Xk ... | 
                 
                
                | CVE-2025-26596 | 
                A heap overflow flaw was found in X.Org and Xwayland. The computation  ... | 
                 
                
                | CVE-2025-26597 | 
                A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTy ... | 
                 
                
                | CVE-2025-26598 | 
                An out-of-bounds write flaw was found in X.Org and Xwayland. The funct ... | 
                 
                
                | CVE-2025-26599 | 
                An access to an uninitialized pointer flaw was found in X.Org and Xway ... | 
                 
                
                | CVE-2025-26600 | 
                A use-after-free flaw was found in X.Org and Xwayland. When a device i ... | 
                 
                
                | CVE-2025-26601 | 
                A use-after-free flaw was found in X.Org and Xwayland. When changing a ... | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.18) focal-security; urgency=medium 
  * SECURITY UPDATE: Heap-based buffer overflow in _XkbSetCompatMap
     - debian/patches/CVE-2024-9632.patch: properly update size in
       xkb/xkb.c.
     - CVE-2024-9632 
 -- Marc Deslauriers <email address hidden>  Fri, 11 Oct 2024 10:23:55 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-9632 | 
                A flaw was found in the X.org server. Due to improperly tracked alloca ... | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.17) focal-security; urgency=medium 
  * SECURITY REGRESSION: Avoid possible double-free
     - debian/patches/CVE-2024-31083-regression.patch:
       fix a regression caused for a double-free at the last
       changes fixed by CVE-2024-31083 (LP: #2060354) 
 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 08 Apr 2024 22:36:10 -0300 
         | 
    
    | Source diff to previous version | 
        
        | 
            
            
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.16) focal-security; urgency=medium 
  * SECURITY UPDATE: Heap buffer over read
     - debian/patches/CVE-2024-31080.patch: fixes byte
       swapping in replies in Xi/xiselectev.c.
     - CVE-2024-31080
   * SECURITY UPDATE: Heap buffer over read
     - debian/patches/CVE-2024-31081.patch: fixes byte
       swapping in replies in Xi/xipassivegrab.c.
     - CVE-2024-31081
   * SECURITY UPDATE: Heap buffer over read
     - debian/patches/CVE-2024-31082.patch: makes
       ProcAppleDRICreatePixmap use unswapped length to
       send reply in hw/xquartz/xpr/appledir.c.
     - CVE-2024-31082
   * SECURITY UPDATE: User-after-free
     - debian/patches/CVE-2024-31083.patch: fix recounting of glyphs
       during ProcRenderAddGlyphs in render/glyph.c.
     - CVE-2024-31083 
 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 01 Apr 2024 17:17:12 -0300 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-31080 | 
                A heap-based buffer over-read vulnerability was found in the X.org ser ... | 
                 
                
                | CVE-2024-31081 | 
                A heap-based buffer over-read vulnerability was found in the X.org ser ... | 
                 
                
                | CVE-2024-31082 | 
                A heap-based buffer over-read vulnerability was found in the X.org ser ... | 
                 
                
                | CVE-2024-31083 | 
                User-after-free in ProcRenderAddGlyphs | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium 
  * SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
     - debian/patches/CVE-2024-21886-3.patch: fix use after free in input
       device shutdown in dix/devices.c. 
 -- Marc Deslauriers <email address hidden>  Mon, 29 Jan 2024 07:44:21 -0500 
         | 
    
    
        
        | 
            
            
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates