UbuntuUpdates.org

Package "xorg-server-source"

Name: xorg-server-source

Description:

Xorg X server - source files

Latest version: 2:1.20.9-2ubuntu1.2~20.04.1
Release: focal (20.04)
Level: security
Repository: universe
Head package: xorg-server
Homepage: https://www.x.org/

Links


Download "xorg-server-source"


Other versions of "xorg-server-source" in Focal

Repository Area Version
base universe 2:1.20.8-2ubuntu2
updates universe 2:1.20.9-2ubuntu1.2~20.04.1

Changelog

Version: 2:1.20.9-2ubuntu1.2~20.04.1 2021-01-18 19:06:31 UTC

  xorg-server (2:1.20.9-2ubuntu1.2~20.04.1) focal-security; urgency=medium

  * Backport to focal; Reintroduce CVE fixes from focal 1.20.8-2ubuntu2.6
    / groovy 1.20.9-2ubuntu1.1.

 -- Timo Aaltonen <email address hidden> Sun, 17 Jan 2021 11:13:31 +0200

Source diff to previous version

Version: 2:1.20.8-2ubuntu2.6 2020-12-01 17:07:40 UTC

  xorg-server (2:1.20.8-2ubuntu2.6) focal-security; urgency=medium

  * SECURITY UPDATE: out of bounds memory accesses on too short request
    - debian/patches/CVE-2020-14360.patch: check SetMap request length
      carefully in xkb/xkb.c.
    - CVE-2020-14360
  * SECURITY UPDATE: multiple heap overflows
    - debian/patches/CVE-2020-25712.patch: add bounds checks in xkb/xkb.c.
    - CVE-2020-25712

 -- Marc Deslauriers <email address hidden> Mon, 30 Nov 2020 12:56:33 -0500

Source diff to previous version
CVE-2020-14360 Check SetMap request length carefully
CVE-2020-25712 Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows

Version: 2:1.20.8-2ubuntu2.4 2020-09-09 12:06:47 UTC

  xorg-server (2:1.20.8-2ubuntu2.4) focal-security; urgency=medium

  * SECURITY UPDATE: Out-Of-Bounds access in XkbSetNames function
    - debian/patches/CVE-2020-14345.patch: correct bounds checking in
      xkb/xkb.c.
    - CVE-2020-14345

 -- Marc Deslauriers <email address hidden> Fri, 04 Sep 2020 09:34:27 -0400

Source diff to previous version

Version: 2:1.20.8-2ubuntu2.3 2020-09-02 14:06:23 UTC

  xorg-server (2:1.20.8-2ubuntu2.3) focal-security; urgency=medium

  * SECURITY UPDATE: Integer underflow in the X input extension protocol
    - debian/patches/CVE-2020-14346.patch: properly calculate length in
      Xi/xichangehierarchy.c.
    - CVE-2020-14346
  * SECURITY UPDATE: server memory leak
    - debian/patches/CVE-2020-14347.patch: initialize memory in
      dix/pixmap.c.
    - CVE-2020-14347
  * SECURITY UPDATE: Integer Underflow Privilege Escalation
    - debian/patches/CVE-2020-14361.patch: fix dataLeft calculation in
      xkb/xkbSwap.c.
    - CVE-2020-14361
  * SECURITY UPDATE: Integer Underflow Privilege Escalation
    - debian/patches/CVE-2020-14362.patch: properly calculate lengths in
      record/record.c.
    - CVE-2020-14362

 -- Marc Deslauriers <email address hidden> Mon, 31 Aug 2020 09:45:37 -0400

CVE-2020-14347 A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg



About   -   Send Feedback to @ubuntu_updates