Package "xdmx"
  
    
    
        | Name: | 
        xdmx
            
         | 
    
    
         Description: | 
        
             distributed multihead X server 
         | 
    
    
        | Latest version: | 
        2:1.20.13-1ubuntu1~20.04.20 | 
    
    
        | Release: | 
        focal (20.04) | 
    
    
        | Level: | 
        updates | 
    
    
        | Repository: | 
        universe | 
    
         
            | Head package: | 
            xorg-server | 
         
        
            | Homepage: | 
            https://www.x.org/ | 
        
    
   
  
  
 
Links
    Download "xdmx"
    
Other versions of "xdmx" in Focal
    
Changelog
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.15) focal-security; urgency=medium 
  * SECURITY REGRESSION: memory leak due to incomplete fix (LP: #2051536)
     - debian/patches/CVE-2024-21886-3.patch: fix use after free in input
       device shutdown in dix/devices.c. 
 -- Marc Deslauriers <email address hidden>  Mon, 29 Jan 2024 07:44:21 -0500 
         | 
    
    | Source diff to previous version | 
        
        | 
            
            
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.14) focal-security; urgency=medium 
  * SECURITY UPDATE: Heap buffer overflow in DeviceFocusEvent and
     ProcXIQueryPointer
     - debian/patches/CVE-2023-6816.patch: allocate enough space for logical
       button maps in Xi/xiquerypointer.c, dix/enterleave.c.
     - CVE-2023-6816
   * SECURITY UPDATE: Reattaching to different master device may lead to
     out-of-bounds memory access
     - debian/patches/CVE-2024-0229-1.patch: allocate sufficient xEvents for
       our DeviceStateNotify in dix/enterleave.c.
     - debian/patches/CVE-2024-0229-2.patch: fix DeviceStateNotify event
       calculation in dix/enterleave.c.
     - debian/patches/CVE-2024-0229-3.patch: when creating a new
       ButtonClass, set the number of buttons in Xi/exevents.c.
     - debian/patches/CVE-2024-0229-4.patch: require a pointer and keyboard
       device for XIAttachToMaster in Xi/xichangehierarchy.c.
     - CVE-2024-0229
   * SECURITY UPDATE: SELinux unlabeled GLX PBuffer
     - debian/patches/CVE-2024-0408.patch: call XACE hooks on the GLX buffer
       in glx/glxcmds.c.
     - CVE-2024-0408
   * SECURITY UPDATE: SELinux context corruption
     - debian/patches/CVE-2024-0409.patch: use the proper private key for
       cursor in hw/kdrive/ephyr/ephyrcursor.c,
       hw/xwayland/xwayland-cursor.c.
     - CVE-2024-0409
   * SECURITY UPDATE: Heap buffer overflow in XISendDeviceHierarchyEvent
     - debian/patches/CVE-2024-21885.patch: flush hierarchy events after
       adding/removing master devices in Xi/xichangehierarchy.c.
     - CVE-2024-21885
   * SECURITY UPDATE: Heap buffer overflow in DisableDevice
     - debian/patches/CVE-2024-21886-1.patch: do not keep linked list
       pointer during recursion in dix/devices.c.
     - debian/patches/CVE-2024-21886-2.patch: when disabling a master, float
       disabled slaved devices too in dix/devices.c.
     - CVE-2024-21886 
 -- Marc Deslauriers <email address hidden>  Mon, 15 Jan 2024 10:45:41 -0500 
         | 
    
    | Source diff to previous version | 
        
        | 
            
            
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.12) focal-security; urgency=medium 
  * SECURITY UPDATE: Out-of-bounds memory write in XKB button actions
     - debian/patches/CVE-2023-6377.patch: allocate enough XkbActions for
       our buttons in Xi/exevents.c, dix/devices.c.
     - CVE-2023-6377
   * SECURITY UPDATE: Out-of-bounds memory read in RRChangeOutputProperty
     and RRChangeProviderProperty
     - debian/patches/CVE-2023-6478.patch: avoid integer truncation in
       length check of ProcRRChange*Property in randr/rrproperty.c,
       randr/rrproviderproperty.c.
     - CVE-2023-6478 
 -- Marc Deslauriers <email address hidden>  Tue, 12 Dec 2023 20:29:21 -0500 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2023-6377 | 
                A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory | 
                 
                
                | CVE-2023-6478 | 
                A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow wh | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.9) focal-security; urgency=medium 
  * SECURITY UPDATE: OOB write in XIChangeDeviceProperty and
     RRChangeOutputProperty
     - debian/patches/CVE-2023-5367.patch: fix handling of PropModeAppend
       and PropModePrepend in Xi/xiproperty.c, randr/rrproperty.c.
     - CVE-2023-5367
   * SECURITY UPDATE: Use-after-free bug in DestroyWindow
     - debian/patches/CVE-2023-5380.patch: reset the PointerWindows
       reference on screen switch in dix/enterleave.h, include/eventstr.h,
       mi/mipointer.c.
     - CVE-2023-5380 
 -- Marc Deslauriers <email address hidden>  Mon, 23 Oct 2023 12:31:55 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2023-5367 | 
                X.Org server: OOB write in XIChangeDeviceProperty/RRChangeOutputProperty | 
                 
                
                | CVE-2023-5380 | 
                Use-after-free bug in DestroyWindow | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               xorg-server (2:1.20.13-1ubuntu1~20.04.8) focal-security; urgency=medium 
  * SECURITY UPDATE: Overlay Window Use-After-Free
     - debian/patches/CVE-2023-1393.patch: fix use-after-free of the COW in
       composite/compwindow.c.
     - CVE-2023-1393 
 -- Marc Deslauriers <email address hidden>  Wed, 29 Mar 2023 08:53:02 -0400 
         | 
    
    
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates