UBUNTU-CVE-2026-33999

Source
https://ubuntu.com/security/CVE-2026-33999
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-33999
Upstream
  • CVE-2026-33999
Published
2026-04-14T00:00:00Z
Modified
2026-04-22T16:31:45.174380Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

XKB Integer Underflow in XkbSetCompatMap(). If a "compat" buffer was previously truncated, there will be unused space left in the buffer. The code in XkbSetCompatMap() will use that space, but fails to update the number of valid entries actually in the buffer. As a result, that can lead to buffer read overrun when processing a future request.

References

Affected packages

Ubuntu:22.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.16?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.13-1ubuntu1
2:1.20.13-1ubuntu2
2:1.20.14-1ubuntu1
2:21.*
2:21.1.3-2ubuntu2
2:21.1.3-2ubuntu2.1
2:21.1.3-2ubuntu2.2
2:21.1.3-2ubuntu2.3
2:21.1.3-2ubuntu2.4
2:21.1.3-2ubuntu2.5
2:21.1.3-2ubuntu2.6
2:21.1.3-2ubuntu2.7
2:21.1.3-2ubuntu2.8
2:21.1.3-2ubuntu2.9
2:21.1.4-2ubuntu1.7~22.04.1
2:21.1.4-2ubuntu1.7~22.04.2
2:21.1.4-2ubuntu1.7~22.04.5
2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.8
2:21.1.4-2ubuntu1.7~22.04.9
2:21.1.4-2ubuntu1.7~22.04.10
2:21.1.4-2ubuntu1.7~22.04.11
2:21.1.4-2ubuntu1.7~22.04.12
2:21.1.4-2ubuntu1.7~22.04.13
2:21.1.4-2ubuntu1.7~22.04.14
2:21.1.4-2ubuntu1.7~22.04.15
2:21.1.4-2ubuntu1.7~22.04.16

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.20?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.2-0ubuntu1
2:21.1.3-1
2:21.1.3-1ubuntu1
2:21.1.4-1
2:22.*
2:22.1.0-1
2:22.1.1-1
2:22.1.1-1ubuntu0.1
2:22.1.1-1ubuntu0.2
2:22.1.1-1ubuntu0.3
2:22.1.1-1ubuntu0.4
2:22.1.1-1ubuntu0.5
2:22.1.1-1ubuntu0.6
2:22.1.1-1ubuntu0.7
2:22.1.1-1ubuntu0.9
2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.11
2:22.1.1-1ubuntu0.12
2:22.1.1-1ubuntu0.13
2:22.1.1-1ubuntu0.14
2:22.1.1-1ubuntu0.15
2:22.1.1-1ubuntu0.17
2:22.1.1-1ubuntu0.18
2:22.1.1-1ubuntu0.19
2:22.1.1-1ubuntu0.20

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:22.1.1-1ubuntu0.20"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:24.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.7-3ubuntu2
2:21.1.7-3ubuntu2.1
2:21.1.10-1ubuntu1
2:21.1.11-2ubuntu1
2:21.1.12-1ubuntu1
2:21.1.12-1ubuntu1.1
2:21.1.12-1ubuntu1.2
2:21.1.12-1ubuntu1.3
2:21.1.12-1ubuntu1.4
2:21.1.12-1ubuntu1.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:23.*
2:23.2.0-1
2:23.2.0-1ubuntu0.1
2:23.2.3-1
2:23.2.4-1
2:23.2.4-1build1
2:23.2.4-1build2
2:23.2.4-1build3
2:23.2.6-1
2:23.2.6-1ubuntu0.1
2:23.2.6-1ubuntu0.2
2:23.2.6-1ubuntu0.4
2:23.2.6-1ubuntu0.5
2:23.2.6-1ubuntu0.6
2:23.2.6-1ubuntu0.7
2:23.2.6-1ubuntu0.8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:23.2.6-1ubuntu0.8"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:25.10
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.18-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.16-1ubuntu1
2:21.1.18-1ubuntu1
2:21.1.18-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:24.1.6-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:24.*
2:24.1.6-1
2:24.1.6-1ubuntu1
2:24.1.6-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:24.1.6-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:Pro:14.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7
2:1.15.1-0ubuntu2.9
2:1.15.1-0ubuntu2.10
2:1.15.1-0ubuntu2.11
2:1.15.1-0ubuntu2.11+esm2
2:1.15.1-0ubuntu2.11+esm3
2:1.15.1-0ubuntu2.11+esm4
2:1.15.1-0ubuntu2.11+esm5
2:1.15.1-0ubuntu2.11+esm6
2:1.15.1-0ubuntu2.11+esm7
2:1.15.1-0ubuntu2.11+esm8
2:1.15.1-0ubuntu2.11+esm9
2:1.15.1-0ubuntu2.11+esm11
2:1.15.1-0ubuntu2.11+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:Pro:16.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm18?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2
2:1.18.4-0ubuntu0.3
2:1.18.4-0ubuntu0.4
2:1.18.4-0ubuntu0.6
2:1.18.4-0ubuntu0.7
2:1.18.4-0ubuntu0.8
2:1.18.4-0ubuntu0.9
2:1.18.4-0ubuntu0.10
2:1.18.4-0ubuntu0.11
2:1.18.4-0ubuntu0.12
2:1.18.4-0ubuntu0.12+esm1
2:1.18.4-0ubuntu0.12+esm2
2:1.18.4-0ubuntu0.12+esm4
2:1.18.4-0ubuntu0.12+esm5
2:1.18.4-0ubuntu0.12+esm6
2:1.18.4-0ubuntu0.12+esm8
2:1.18.4-0ubuntu0.12+esm9
2:1.18.4-0ubuntu0.12+esm10
2:1.18.4-0ubuntu0.12+esm12
2:1.18.4-0ubuntu0.12+esm13
2:1.18.4-0ubuntu0.12+esm14
2:1.18.4-0ubuntu0.12+esm15
2:1.18.4-0ubuntu0.12+esm16
2:1.18.4-0ubuntu0.12+esm17
2:1.18.4-0ubuntu0.12+esm18

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.18.4-1ubuntu6.1~16.04.1
2:1.18.4-1ubuntu6.1~16.04.2
2:1.19.3-1ubuntu1~16.04.2
2:1.19.3-1ubuntu1~16.04.3
2:1.19.3-1ubuntu1~16.04.4
2:1.19.5-0ubuntu2~16.04.1
2:1.19.6-1ubuntu4~16.04.1
2:1.19.6-1ubuntu4.1~16.04.1
2:1.19.6-1ubuntu4.1~16.04.2
2:1.19.6-1ubuntu4.1~16.04.3
2:1.19.6-1ubuntu4.1~16.04.4
2:1.19.6-1ubuntu4.1~16.04.5
2:1.19.6-1ubuntu4.1~16.04.6
2:1.19.6-1ubuntu4.1~16.04.6+esm1
2:1.19.6-1ubuntu4.1~16.04.6+esm3
2:1.19.6-1ubuntu4.1~16.04.6+esm4
2:1.19.6-1ubuntu4.1~16.04.6+esm5
2:1.19.6-1ubuntu4.1~16.04.6+esm6
2:1.19.6-1ubuntu4.1~16.04.6+esm7
2:1.19.6-1ubuntu4.1~16.04.6+esm8
2:1.19.6-1ubuntu4.1~16.04.6+esm9
2:1.19.6-1ubuntu4.1~16.04.6+esm10

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xmir-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xorg-server-source-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xephyr-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xwayland-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:Pro:18.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm13?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.19.5-0ubuntu2
2:1.19.6-1ubuntu1
2:1.19.6-1ubuntu2
2:1.19.6-1ubuntu3
2:1.19.6-1ubuntu4
2:1.19.6-1ubuntu4.1
2:1.19.6-1ubuntu4.2
2:1.19.6-1ubuntu4.3
2:1.19.6-1ubuntu4.4
2:1.19.6-1ubuntu4.5
2:1.19.6-1ubuntu4.6
2:1.19.6-1ubuntu4.7
2:1.19.6-1ubuntu4.8
2:1.19.6-1ubuntu4.9
2:1.19.6-1ubuntu4.10
2:1.19.6-1ubuntu4.11
2:1.19.6-1ubuntu4.12
2:1.19.6-1ubuntu4.13
2:1.19.6-1ubuntu4.14
2:1.19.6-1ubuntu4.15
2:1.19.6-1ubuntu4.15+esm1
2:1.19.6-1ubuntu4.15+esm3
2:1.19.6-1ubuntu4.15+esm4
2:1.19.6-1ubuntu4.15+esm5
2:1.19.6-1ubuntu4.15+esm7
2:1.19.6-1ubuntu4.15+esm8
2:1.19.6-1ubuntu4.15+esm9
2:1.19.6-1ubuntu4.15+esm10
2:1.19.6-1ubuntu4.15+esm11
2:1.19.6-1ubuntu4.15+esm12
2:1.19.6-1ubuntu4.15+esm13

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
xorg-server-hwe-18.04

Package

Name
xorg-server-hwe-18.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.1-3ubuntu2.1~18.04.1
2:1.20.4-1ubuntu3~18.04.1
2:1.20.5+git20191008-0ubuntu1~18.04.1
2:1.20.8-2ubuntu2.1~18.04.1
2:1.20.8-2ubuntu2.2~18.04.1
2:1.20.8-2ubuntu2.2~18.04.2
2:1.20.8-2ubuntu2.2~18.04.3
2:1.20.8-2ubuntu2.2~18.04.4
2:1.20.8-2ubuntu2.2~18.04.5
2:1.20.8-2ubuntu2.2~18.04.6
2:1.20.8-2ubuntu2.2~18.04.7
2:1.20.8-2ubuntu2.2~18.04.8
2:1.20.8-2ubuntu2.2~18.04.9
2:1.20.8-2ubuntu2.2~18.04.10
2:1.20.8-2ubuntu2.2~18.04.11
2:1.20.8-2ubuntu2.2~18.04.11+esm1
2:1.20.8-2ubuntu2.2~18.04.11+esm2
2:1.20.8-2ubuntu2.2~18.04.11+esm3
2:1.20.8-2ubuntu2.2~18.04.11+esm4
2:1.20.8-2ubuntu2.2~18.04.11+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xorg-server-source-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xephyr-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xwayland-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"
Ubuntu:Pro:20.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.20+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.5+git20191008-0ubuntu1
2:1.20.6-1ubuntu1
2:1.20.7-2ubuntu1
2:1.20.7-2ubuntu2
2:1.20.8-2ubuntu2
2:1.20.8-2ubuntu2.1
2:1.20.8-2ubuntu2.2
2:1.20.8-2ubuntu2.3
2:1.20.8-2ubuntu2.4
2:1.20.8-2ubuntu2.6
2:1.20.9-2ubuntu1.1~20.04.1
2:1.20.9-2ubuntu1.2~20.04.1
2:1.20.9-2ubuntu1.2~20.04.2
2:1.20.11-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.3
2:1.20.13-1ubuntu1~20.04.4
2:1.20.13-1ubuntu1~20.04.5
2:1.20.13-1ubuntu1~20.04.6
2:1.20.13-1ubuntu1~20.04.8
2:1.20.13-1ubuntu1~20.04.9
2:1.20.13-1ubuntu1~20.04.12
2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.15
2:1.20.13-1ubuntu1~20.04.16
2:1.20.13-1ubuntu1~20.04.17
2:1.20.13-1ubuntu1~20.04.18
2:1.20.13-1ubuntu1~20.04.19
2:1.20.13-1ubuntu1~20.04.20
2:1.20.13-1ubuntu1~20.04.20+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33999.json"