UBUNTU-CVE-2025-49180

Source
https://ubuntu.com/security/CVE-2025-49180
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-49180
Upstream
Downstream
Related
Published
2025-06-17T00:00:00Z
Modified
2026-01-20T19:07:56.416126Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.

References

Affected packages

Ubuntu:22.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.15?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.4-2ubuntu1.7~22.04.15

Affected versions

2:1.*

2:1.20.13-1ubuntu1
2:1.20.13-1ubuntu2
2:1.20.14-1ubuntu1

2:21.*

2:21.1.3-2ubuntu2
2:21.1.3-2ubuntu2.1
2:21.1.3-2ubuntu2.2
2:21.1.3-2ubuntu2.3
2:21.1.3-2ubuntu2.4
2:21.1.3-2ubuntu2.5
2:21.1.3-2ubuntu2.6
2:21.1.3-2ubuntu2.7
2:21.1.3-2ubuntu2.8
2:21.1.3-2ubuntu2.9
2:21.1.4-2ubuntu1.7~22.04.1
2:21.1.4-2ubuntu1.7~22.04.2
2:21.1.4-2ubuntu1.7~22.04.5
2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.8
2:21.1.4-2ubuntu1.7~22.04.9
2:21.1.4-2ubuntu1.7~22.04.10
2:21.1.4-2ubuntu1.7~22.04.11
2:21.1.4-2ubuntu1.7~22.04.12
2:21.1.4-2ubuntu1.7~22.04.13
2:21.1.4-2ubuntu1.7~22.04.14

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.15"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.19?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:22.1.1-1ubuntu0.19

Affected versions

2:21.*

2:21.1.2-0ubuntu1
2:21.1.3-1
2:21.1.3-1ubuntu1
2:21.1.4-1

2:22.*

2:22.1.0-1
2:22.1.1-1
2:22.1.1-1ubuntu0.1
2:22.1.1-1ubuntu0.2
2:22.1.1-1ubuntu0.3
2:22.1.1-1ubuntu0.4
2:22.1.1-1ubuntu0.5
2:22.1.1-1ubuntu0.6
2:22.1.1-1ubuntu0.7
2:22.1.1-1ubuntu0.9
2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.11
2:22.1.1-1ubuntu0.12
2:22.1.1-1ubuntu0.13
2:22.1.1-1ubuntu0.14
2:22.1.1-1ubuntu0.15
2:22.1.1-1ubuntu0.17
2:22.1.1-1ubuntu0.18

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:22.1.1-1ubuntu0.19"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:24.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.12-1ubuntu1.4

Affected versions

2:21.*

2:21.1.7-3ubuntu2
2:21.1.7-3ubuntu2.1
2:21.1.10-1ubuntu1
2:21.1.11-2ubuntu1
2:21.1.12-1ubuntu1
2:21.1.12-1ubuntu1.1
2:21.1.12-1ubuntu1.2
2:21.1.12-1ubuntu1.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.12-1ubuntu1.4"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.6?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:23.2.6-1ubuntu0.6

Affected versions

2:23.*

2:23.2.0-1
2:23.2.0-1ubuntu0.1
2:23.2.3-1
2:23.2.4-1
2:23.2.4-1build1
2:23.2.4-1build2
2:23.2.4-1build3
2:23.2.6-1
2:23.2.6-1ubuntu0.1
2:23.2.6-1ubuntu0.2
2:23.2.6-1ubuntu0.4
2:23.2.6-1ubuntu0.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:23.2.6-1ubuntu0.6"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:25.10

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.18-1ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.18-1ubuntu1

Affected versions

2:21.*

2:21.1.16-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.18-1ubuntu1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.18-1ubuntu1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:24.1.6-1ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:24.1.6-1ubuntu1

Affected versions

2:24.*

2:24.1.6-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:24.1.6-1ubuntu1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:Pro:14.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*

2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7
2:1.15.1-0ubuntu2.9
2:1.15.1-0ubuntu2.10
2:1.15.1-0ubuntu2.11
2:1.15.1-0ubuntu2.11+esm2
2:1.15.1-0ubuntu2.11+esm3
2:1.15.1-0ubuntu2.11+esm4
2:1.15.1-0ubuntu2.11+esm5
2:1.15.1-0ubuntu2.11+esm6
2:1.15.1-0ubuntu2.11+esm7
2:1.15.1-0ubuntu2.11+esm8
2:1.15.1-0ubuntu2.11+esm9
2:1.15.1-0ubuntu2.11+esm11
2:1.15.1-0ubuntu2.11+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:Pro:16.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm18?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.18.4-0ubuntu0.12+esm18

Affected versions

2:1.*

2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2
2:1.18.4-0ubuntu0.3
2:1.18.4-0ubuntu0.4
2:1.18.4-0ubuntu0.6
2:1.18.4-0ubuntu0.7
2:1.18.4-0ubuntu0.8
2:1.18.4-0ubuntu0.9
2:1.18.4-0ubuntu0.10
2:1.18.4-0ubuntu0.11
2:1.18.4-0ubuntu0.12
2:1.18.4-0ubuntu0.12+esm1
2:1.18.4-0ubuntu0.12+esm2
2:1.18.4-0ubuntu0.12+esm4
2:1.18.4-0ubuntu0.12+esm5
2:1.18.4-0ubuntu0.12+esm6
2:1.18.4-0ubuntu0.12+esm8
2:1.18.4-0ubuntu0.12+esm9
2:1.18.4-0ubuntu0.12+esm10
2:1.18.4-0ubuntu0.12+esm12
2:1.18.4-0ubuntu0.12+esm13
2:1.18.4-0ubuntu0.12+esm14
2:1.18.4-0ubuntu0.12+esm15
2:1.18.4-0ubuntu0.12+esm16
2:1.18.4-0ubuntu0.12+esm17

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.6-1ubuntu4.1~16.04.6+esm10

Affected versions

2:1.*

2:1.18.4-1ubuntu6.1~16.04.1
2:1.18.4-1ubuntu6.1~16.04.2
2:1.19.3-1ubuntu1~16.04.2
2:1.19.3-1ubuntu1~16.04.3
2:1.19.3-1ubuntu1~16.04.4
2:1.19.5-0ubuntu2~16.04.1
2:1.19.6-1ubuntu4~16.04.1
2:1.19.6-1ubuntu4.1~16.04.1
2:1.19.6-1ubuntu4.1~16.04.2
2:1.19.6-1ubuntu4.1~16.04.3
2:1.19.6-1ubuntu4.1~16.04.4
2:1.19.6-1ubuntu4.1~16.04.5
2:1.19.6-1ubuntu4.1~16.04.6
2:1.19.6-1ubuntu4.1~16.04.6+esm1
2:1.19.6-1ubuntu4.1~16.04.6+esm3
2:1.19.6-1ubuntu4.1~16.04.6+esm4
2:1.19.6-1ubuntu4.1~16.04.6+esm5
2:1.19.6-1ubuntu4.1~16.04.6+esm6
2:1.19.6-1ubuntu4.1~16.04.6+esm7
2:1.19.6-1ubuntu4.1~16.04.6+esm8
2:1.19.6-1ubuntu4.1~16.04.6+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xmir-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xorg-server-source-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xephyr-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xwayland-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:Pro:18.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm13?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.6-1ubuntu4.15+esm13

Affected versions

2:1.*

2:1.19.5-0ubuntu2
2:1.19.6-1ubuntu1
2:1.19.6-1ubuntu2
2:1.19.6-1ubuntu3
2:1.19.6-1ubuntu4
2:1.19.6-1ubuntu4.1
2:1.19.6-1ubuntu4.2
2:1.19.6-1ubuntu4.3
2:1.19.6-1ubuntu4.4
2:1.19.6-1ubuntu4.5
2:1.19.6-1ubuntu4.6
2:1.19.6-1ubuntu4.7
2:1.19.6-1ubuntu4.8
2:1.19.6-1ubuntu4.9
2:1.19.6-1ubuntu4.10
2:1.19.6-1ubuntu4.11
2:1.19.6-1ubuntu4.12
2:1.19.6-1ubuntu4.13
2:1.19.6-1ubuntu4.14
2:1.19.6-1ubuntu4.15
2:1.19.6-1ubuntu4.15+esm1
2:1.19.6-1ubuntu4.15+esm3
2:1.19.6-1ubuntu4.15+esm4
2:1.19.6-1ubuntu4.15+esm5
2:1.19.6-1ubuntu4.15+esm7
2:1.19.6-1ubuntu4.15+esm8
2:1.19.6-1ubuntu4.15+esm9
2:1.19.6-1ubuntu4.15+esm10
2:1.19.6-1ubuntu4.15+esm11
2:1.19.6-1ubuntu4.15+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

xorg-server-hwe-18.04

Package

Name
xorg-server-hwe-18.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.20.8-2ubuntu2.2~18.04.11+esm5

Affected versions

2:1.*

2:1.20.1-3ubuntu2.1~18.04.1
2:1.20.4-1ubuntu3~18.04.1
2:1.20.5+git20191008-0ubuntu1~18.04.1
2:1.20.8-2ubuntu2.1~18.04.1
2:1.20.8-2ubuntu2.2~18.04.1
2:1.20.8-2ubuntu2.2~18.04.2
2:1.20.8-2ubuntu2.2~18.04.3
2:1.20.8-2ubuntu2.2~18.04.4
2:1.20.8-2ubuntu2.2~18.04.5
2:1.20.8-2ubuntu2.2~18.04.6
2:1.20.8-2ubuntu2.2~18.04.7
2:1.20.8-2ubuntu2.2~18.04.8
2:1.20.8-2ubuntu2.2~18.04.9
2:1.20.8-2ubuntu2.2~18.04.10
2:1.20.8-2ubuntu2.2~18.04.11
2:1.20.8-2ubuntu2.2~18.04.11+esm1
2:1.20.8-2ubuntu2.2~18.04.11+esm2
2:1.20.8-2ubuntu2.2~18.04.11+esm3
2:1.20.8-2ubuntu2.2~18.04.11+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xorg-server-source-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xephyr-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xwayland-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"

Ubuntu:Pro:20.04:LTS

xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.20+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.20.13-1ubuntu1~20.04.20+esm1

Affected versions

2:1.*

2:1.20.5+git20191008-0ubuntu1
2:1.20.6-1ubuntu1
2:1.20.7-2ubuntu1
2:1.20.7-2ubuntu2
2:1.20.8-2ubuntu2
2:1.20.8-2ubuntu2.1
2:1.20.8-2ubuntu2.2
2:1.20.8-2ubuntu2.3
2:1.20.8-2ubuntu2.4
2:1.20.8-2ubuntu2.6
2:1.20.9-2ubuntu1.1~20.04.1
2:1.20.9-2ubuntu1.2~20.04.1
2:1.20.9-2ubuntu1.2~20.04.2
2:1.20.11-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.3
2:1.20.13-1ubuntu1~20.04.4
2:1.20.13-1ubuntu1~20.04.5
2:1.20.13-1ubuntu1~20.04.6
2:1.20.13-1ubuntu1~20.04.8
2:1.20.13-1ubuntu1~20.04.9
2:1.20.13-1ubuntu1~20.04.12
2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.15
2:1.20.13-1ubuntu1~20.04.16
2:1.20.13-1ubuntu1~20.04.17
2:1.20.13-1ubuntu1~20.04.18
2:1.20.13-1ubuntu1~20.04.19
2:1.20.13-1ubuntu1~20.04.20

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-dev",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49180.json"