UbuntuUpdates.org

Package "xorg-server-hwe-16.04"

Name: xorg-server-hwe-16.04

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Xorg X server - core server
  • Xorg - the X.Org X server (debugging symbols)
  • Xorg X server - development files
  • setuid root Xorg server wrapper

Latest version: 2:1.19.6-1ubuntu4.1~16.04.6
Release: xenial (16.04)
Level: security
Repository: main

Links



Other versions of "xorg-server-hwe-16.04" in Xenial

Repository Area Version
security universe 2:1.19.6-1ubuntu4.1~16.04.6
updates universe 2:1.19.6-1ubuntu4.1~16.04.6
updates main 2:1.19.6-1ubuntu4.1~16.04.6

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:1.19.6-1ubuntu4.1~16.04.6 2021-04-13 16:06:24 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.6) xenial-security; urgency=medium

  * SECURITY UPDATE: XChangeFeedbackControl Integer Underflow
    - debian/patches/CVE-2021-3472.patch: add check to Xi/chgfctl.c.
    - CVE-2021-3472

 -- Marc Deslauriers <email address hidden> Thu, 08 Apr 2021 09:42:05 -0400

Source diff to previous version
CVE-2021-3472 Fix XChangeFeedbackControl() request underflow

Version: 2:1.19.6-1ubuntu4.1~16.04.5 2020-12-01 17:07:33 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.5) xenial-security; urgency=medium

  * SECURITY UPDATE: out of bounds memory accesses on too short request
    - debian/patches/CVE-2020-14360.patch: check SetMap request length
      carefully in xkb/xkb.c.
    - CVE-2020-14360
  * SECURITY UPDATE: multiple heap overflows
    - debian/patches/CVE-2020-25712.patch: add bounds checks in xkb/xkb.c.
    - CVE-2020-25712

 -- Marc Deslauriers <email address hidden> Mon, 30 Nov 2020 13:01:10 -0500

Source diff to previous version
CVE-2020-14360 Check SetMap request length carefully
CVE-2020-25712 Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows

Version: 2:1.19.6-1ubuntu4.1~16.04.4 2020-09-08 13:06:17 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Out-Of-Bounds access in XkbSetNames function
    - debian/patches/CVE-2020-14345.patch: correct bounds checking in
      xkb/xkb.c.
    - CVE-2020-14345

 -- Marc Deslauriers <email address hidden> Fri, 04 Sep 2020 09:37:30 -0400

Source diff to previous version

Version: 2:1.19.6-1ubuntu4.1~16.04.3 2020-09-02 14:06:17 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Integer underflow in the X input extension protocol
    - debian/patches/CVE-2020-14346.patch: properly calculate length in
      Xi/xichangehierarchy.c.
    - CVE-2020-14346
  * SECURITY UPDATE: server memory leak
    - debian/patches/CVE-2020-14347.patch: initialize memory in
      dix/pixmap.c.
    - CVE-2020-14347
  * SECURITY UPDATE: Integer Underflow Privilege Escalation
    - debian/patches/CVE-2020-14361.patch: fix dataLeft calculation in
      xkb/xkbSwap.c.
    - CVE-2020-14361
  * SECURITY UPDATE: Integer Underflow Privilege Escalation
    - debian/patches/CVE-2020-14362.patch: properly calculate lengths in
      record/record.c.
    - CVE-2020-14362

 -- Marc Deslauriers <email address hidden> Mon, 31 Aug 2020 10:21:14 -0400

Source diff to previous version
CVE-2020-14347 A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg

Version: 2:1.19.6-1ubuntu4.1~16.04.2 2018-10-26 15:06:57 UTC

  xorg-server-hwe-16.04 (2:1.19.6-1ubuntu4.1~16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Privilege escalation and file overwrite
    - debian/patches/CVE-2018-14665.patch: disable -logfile and -modulepath
      when running with elevated privileges in
      hw/xfree86/common/xf86Init.c.
    - CVE-2018-14665

 -- Marc Deslauriers <email address hidden> Thu, 25 Oct 2018 11:22:30 -0400

CVE-2018-14665 A flaw was found in xorg-x11-server before 1.20.3. An incorrect ...



About   -   Send Feedback to @ubuntu_updates