UBUNTU-CVE-2025-26599

Source
https://ubuntu.com/security/CVE-2025-26599
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-26599
Upstream
Downstream
Related
Published
2025-02-25T15:00:00Z
Modified
2026-01-20T18:16:59.650646Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.

References

Affected packages

Ubuntu:20.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.19?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.20.13-1ubuntu1~20.04.19

Affected versions

2:1.*

2:1.20.5+git20191008-0ubuntu1
2:1.20.6-1ubuntu1
2:1.20.7-2ubuntu1
2:1.20.7-2ubuntu2
2:1.20.8-2ubuntu2
2:1.20.8-2ubuntu2.1
2:1.20.8-2ubuntu2.2
2:1.20.8-2ubuntu2.3
2:1.20.8-2ubuntu2.4
2:1.20.8-2ubuntu2.6
2:1.20.9-2ubuntu1.1~20.04.1
2:1.20.9-2ubuntu1.2~20.04.1
2:1.20.9-2ubuntu1.2~20.04.2
2:1.20.11-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.3
2:1.20.13-1ubuntu1~20.04.4
2:1.20.13-1ubuntu1~20.04.5
2:1.20.13-1ubuntu1~20.04.6
2:1.20.13-1ubuntu1~20.04.8
2:1.20.13-1ubuntu1~20.04.9
2:1.20.13-1ubuntu1~20.04.12
2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.15
2:1.20.13-1ubuntu1~20.04.16
2:1.20.13-1ubuntu1~20.04.17
2:1.20.13-1ubuntu1~20.04.18

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.19"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:22.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.13?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.4-2ubuntu1.7~22.04.13

Affected versions

2:1.*

2:1.20.13-1ubuntu1
2:1.20.13-1ubuntu2
2:1.20.14-1ubuntu1

2:21.*

2:21.1.3-2ubuntu2
2:21.1.3-2ubuntu2.1
2:21.1.3-2ubuntu2.2
2:21.1.3-2ubuntu2.3
2:21.1.3-2ubuntu2.4
2:21.1.3-2ubuntu2.5
2:21.1.3-2ubuntu2.6
2:21.1.3-2ubuntu2.7
2:21.1.3-2ubuntu2.8
2:21.1.3-2ubuntu2.9
2:21.1.4-2ubuntu1.7~22.04.1
2:21.1.4-2ubuntu1.7~22.04.2
2:21.1.4-2ubuntu1.7~22.04.5
2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.8
2:21.1.4-2ubuntu1.7~22.04.9
2:21.1.4-2ubuntu1.7~22.04.10
2:21.1.4-2ubuntu1.7~22.04.11
2:21.1.4-2ubuntu1.7~22.04.12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.13"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.17?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:22.1.1-1ubuntu0.17

Affected versions

2:21.*

2:21.1.2-0ubuntu1
2:21.1.3-1
2:21.1.3-1ubuntu1
2:21.1.4-1

2:22.*

2:22.1.0-1
2:22.1.1-1
2:22.1.1-1ubuntu0.1
2:22.1.1-1ubuntu0.2
2:22.1.1-1ubuntu0.3
2:22.1.1-1ubuntu0.4
2:22.1.1-1ubuntu0.5
2:22.1.1-1ubuntu0.6
2:22.1.1-1ubuntu0.7
2:22.1.1-1ubuntu0.9
2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.11
2:22.1.1-1ubuntu0.12
2:22.1.1-1ubuntu0.13
2:22.1.1-1ubuntu0.14
2:22.1.1-1ubuntu0.15

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:22.1.1-1ubuntu0.17"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:24.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.12-1ubuntu1.2

Affected versions

2:21.*

2:21.1.7-3ubuntu2
2:21.1.7-3ubuntu2.1
2:21.1.10-1ubuntu1
2:21.1.11-2ubuntu1
2:21.1.12-1ubuntu1
2:21.1.12-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.12-1ubuntu1.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:23.2.6-1ubuntu0.4

Affected versions

2:23.*

2:23.2.0-1
2:23.2.0-1ubuntu0.1
2:23.2.3-1
2:23.2.4-1
2:23.2.4-1build1
2:23.2.4-1build2
2:23.2.4-1build3
2:23.2.6-1
2:23.2.6-1ubuntu0.1
2:23.2.6-1ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:23.2.6-1ubuntu0.4"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:25.10

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.16-1ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.16-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.16-1ubuntu1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.16-1ubuntu1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:Pro:14.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*

2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7
2:1.15.1-0ubuntu2.9
2:1.15.1-0ubuntu2.10
2:1.15.1-0ubuntu2.11
2:1.15.1-0ubuntu2.11+esm2
2:1.15.1-0ubuntu2.11+esm3
2:1.15.1-0ubuntu2.11+esm4
2:1.15.1-0ubuntu2.11+esm5
2:1.15.1-0ubuntu2.11+esm6
2:1.15.1-0ubuntu2.11+esm7
2:1.15.1-0ubuntu2.11+esm8
2:1.15.1-0ubuntu2.11+esm9
2:1.15.1-0ubuntu2.11+esm11
2:1.15.1-0ubuntu2.11+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:Pro:16.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm17?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.18.4-0ubuntu0.12+esm17

Affected versions

2:1.*

2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2
2:1.18.4-0ubuntu0.3
2:1.18.4-0ubuntu0.4
2:1.18.4-0ubuntu0.6
2:1.18.4-0ubuntu0.7
2:1.18.4-0ubuntu0.8
2:1.18.4-0ubuntu0.9
2:1.18.4-0ubuntu0.10
2:1.18.4-0ubuntu0.11
2:1.18.4-0ubuntu0.12
2:1.18.4-0ubuntu0.12+esm1
2:1.18.4-0ubuntu0.12+esm2
2:1.18.4-0ubuntu0.12+esm4
2:1.18.4-0ubuntu0.12+esm5
2:1.18.4-0ubuntu0.12+esm6
2:1.18.4-0ubuntu0.12+esm8
2:1.18.4-0ubuntu0.12+esm9
2:1.18.4-0ubuntu0.12+esm10
2:1.18.4-0ubuntu0.12+esm12
2:1.18.4-0ubuntu0.12+esm13
2:1.18.4-0ubuntu0.12+esm14
2:1.18.4-0ubuntu0.12+esm15
2:1.18.4-0ubuntu0.12+esm16

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm17"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm9?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.6-1ubuntu4.1~16.04.6+esm9

Affected versions

2:1.*

2:1.18.4-1ubuntu6.1~16.04.1
2:1.18.4-1ubuntu6.1~16.04.2
2:1.19.3-1ubuntu1~16.04.2
2:1.19.3-1ubuntu1~16.04.3
2:1.19.3-1ubuntu1~16.04.4
2:1.19.5-0ubuntu2~16.04.1
2:1.19.6-1ubuntu4~16.04.1
2:1.19.6-1ubuntu4.1~16.04.1
2:1.19.6-1ubuntu4.1~16.04.2
2:1.19.6-1ubuntu4.1~16.04.3
2:1.19.6-1ubuntu4.1~16.04.4
2:1.19.6-1ubuntu4.1~16.04.5
2:1.19.6-1ubuntu4.1~16.04.6
2:1.19.6-1ubuntu4.1~16.04.6+esm1
2:1.19.6-1ubuntu4.1~16.04.6+esm3
2:1.19.6-1ubuntu4.1~16.04.6+esm4
2:1.19.6-1ubuntu4.1~16.04.6+esm5
2:1.19.6-1ubuntu4.1~16.04.6+esm6
2:1.19.6-1ubuntu4.1~16.04.6+esm7
2:1.19.6-1ubuntu4.1~16.04.6+esm8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xmir-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xorg-server-source-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xserver-xephyr-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        },
        {
            "binary_name": "xwayland-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm9"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

Ubuntu:Pro:18.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm12?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.6-1ubuntu4.15+esm12

Affected versions

2:1.*

2:1.19.5-0ubuntu2
2:1.19.6-1ubuntu1
2:1.19.6-1ubuntu2
2:1.19.6-1ubuntu3
2:1.19.6-1ubuntu4
2:1.19.6-1ubuntu4.1
2:1.19.6-1ubuntu4.2
2:1.19.6-1ubuntu4.3
2:1.19.6-1ubuntu4.4
2:1.19.6-1ubuntu4.5
2:1.19.6-1ubuntu4.6
2:1.19.6-1ubuntu4.7
2:1.19.6-1ubuntu4.8
2:1.19.6-1ubuntu4.9
2:1.19.6-1ubuntu4.10
2:1.19.6-1ubuntu4.11
2:1.19.6-1ubuntu4.12
2:1.19.6-1ubuntu4.13
2:1.19.6-1ubuntu4.14
2:1.19.6-1ubuntu4.15
2:1.19.6-1ubuntu4.15+esm1
2:1.19.6-1ubuntu4.15+esm3
2:1.19.6-1ubuntu4.15+esm4
2:1.19.6-1ubuntu4.15+esm5
2:1.19.6-1ubuntu4.15+esm7
2:1.19.6-1ubuntu4.15+esm8
2:1.19.6-1ubuntu4.15+esm9
2:1.19.6-1ubuntu4.15+esm10
2:1.19.6-1ubuntu4.15+esm11

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm12"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"

xorg-server-hwe-18.04

Package

Name
xorg-server-hwe-18.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm4?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.20.8-2ubuntu2.2~18.04.11+esm4

Affected versions

2:1.*

2:1.20.1-3ubuntu2.1~18.04.1
2:1.20.4-1ubuntu3~18.04.1
2:1.20.5+git20191008-0ubuntu1~18.04.1
2:1.20.8-2ubuntu2.1~18.04.1
2:1.20.8-2ubuntu2.2~18.04.1
2:1.20.8-2ubuntu2.2~18.04.2
2:1.20.8-2ubuntu2.2~18.04.3
2:1.20.8-2ubuntu2.2~18.04.4
2:1.20.8-2ubuntu2.2~18.04.5
2:1.20.8-2ubuntu2.2~18.04.6
2:1.20.8-2ubuntu2.2~18.04.7
2:1.20.8-2ubuntu2.2~18.04.8
2:1.20.8-2ubuntu2.2~18.04.9
2:1.20.8-2ubuntu2.2~18.04.10
2:1.20.8-2ubuntu2.2~18.04.11
2:1.20.8-2ubuntu2.2~18.04.11+esm1
2:1.20.8-2ubuntu2.2~18.04.11+esm2
2:1.20.8-2ubuntu2.2~18.04.11+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xorg-server-source-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        },
        {
            "binary_name": "xserver-xephyr-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        },
        {
            "binary_name": "xwayland-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm4"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-26599.json"