UBUNTU-CVE-2026-34000

Source
https://ubuntu.com/security/CVE-2026-34000
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-34000
Upstream
  • CVE-2026-34000
Published
2026-04-14T00:00:00Z
Modified
2026-04-22T16:31:11.151467Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

XKB Out-of-bounds Read in CheckSetGeom(). Each key alias entry contains two key names (the alias and the real key name). The code in CheckSetGeom() does its bounds checking using only the first name, allowing XkbAddGeomKeyAlias to read uninitialised memory.

References

Affected packages

Ubuntu:22.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.16?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.13-1ubuntu1
2:1.20.13-1ubuntu2
2:1.20.14-1ubuntu1
2:21.*
2:21.1.3-2ubuntu2
2:21.1.3-2ubuntu2.1
2:21.1.3-2ubuntu2.2
2:21.1.3-2ubuntu2.3
2:21.1.3-2ubuntu2.4
2:21.1.3-2ubuntu2.5
2:21.1.3-2ubuntu2.6
2:21.1.3-2ubuntu2.7
2:21.1.3-2ubuntu2.8
2:21.1.3-2ubuntu2.9
2:21.1.4-2ubuntu1.7~22.04.1
2:21.1.4-2ubuntu1.7~22.04.2
2:21.1.4-2ubuntu1.7~22.04.5
2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.8
2:21.1.4-2ubuntu1.7~22.04.9
2:21.1.4-2ubuntu1.7~22.04.10
2:21.1.4-2ubuntu1.7~22.04.11
2:21.1.4-2ubuntu1.7~22.04.12
2:21.1.4-2ubuntu1.7~22.04.13
2:21.1.4-2ubuntu1.7~22.04.14
2:21.1.4-2ubuntu1.7~22.04.15
2:21.1.4-2ubuntu1.7~22.04.16

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.20?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.2-0ubuntu1
2:21.1.3-1
2:21.1.3-1ubuntu1
2:21.1.4-1
2:22.*
2:22.1.0-1
2:22.1.1-1
2:22.1.1-1ubuntu0.1
2:22.1.1-1ubuntu0.2
2:22.1.1-1ubuntu0.3
2:22.1.1-1ubuntu0.4
2:22.1.1-1ubuntu0.5
2:22.1.1-1ubuntu0.6
2:22.1.1-1ubuntu0.7
2:22.1.1-1ubuntu0.9
2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.11
2:22.1.1-1ubuntu0.12
2:22.1.1-1ubuntu0.13
2:22.1.1-1ubuntu0.14
2:22.1.1-1ubuntu0.15
2:22.1.1-1ubuntu0.17
2:22.1.1-1ubuntu0.18
2:22.1.1-1ubuntu0.19
2:22.1.1-1ubuntu0.20

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:22.1.1-1ubuntu0.20"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:24.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.7-3ubuntu2
2:21.1.7-3ubuntu2.1
2:21.1.10-1ubuntu1
2:21.1.11-2ubuntu1
2:21.1.12-1ubuntu1
2:21.1.12-1ubuntu1.1
2:21.1.12-1ubuntu1.2
2:21.1.12-1ubuntu1.3
2:21.1.12-1ubuntu1.4
2:21.1.12-1ubuntu1.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:23.*
2:23.2.0-1
2:23.2.0-1ubuntu0.1
2:23.2.3-1
2:23.2.4-1
2:23.2.4-1build1
2:23.2.4-1build2
2:23.2.4-1build3
2:23.2.6-1
2:23.2.6-1ubuntu0.1
2:23.2.6-1ubuntu0.2
2:23.2.6-1ubuntu0.4
2:23.2.6-1ubuntu0.5
2:23.2.6-1ubuntu0.6
2:23.2.6-1ubuntu0.7
2:23.2.6-1ubuntu0.8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:23.2.6-1ubuntu0.8"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:25.10
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.18-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.16-1ubuntu1
2:21.1.18-1ubuntu1
2:21.1.18-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:24.1.6-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:24.*
2:24.1.6-1
2:24.1.6-1ubuntu1
2:24.1.6-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:24.1.6-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:Pro:14.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7
2:1.15.1-0ubuntu2.9
2:1.15.1-0ubuntu2.10
2:1.15.1-0ubuntu2.11
2:1.15.1-0ubuntu2.11+esm2
2:1.15.1-0ubuntu2.11+esm3
2:1.15.1-0ubuntu2.11+esm4
2:1.15.1-0ubuntu2.11+esm5
2:1.15.1-0ubuntu2.11+esm6
2:1.15.1-0ubuntu2.11+esm7
2:1.15.1-0ubuntu2.11+esm8
2:1.15.1-0ubuntu2.11+esm9
2:1.15.1-0ubuntu2.11+esm11
2:1.15.1-0ubuntu2.11+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:Pro:16.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm18?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2
2:1.18.4-0ubuntu0.3
2:1.18.4-0ubuntu0.4
2:1.18.4-0ubuntu0.6
2:1.18.4-0ubuntu0.7
2:1.18.4-0ubuntu0.8
2:1.18.4-0ubuntu0.9
2:1.18.4-0ubuntu0.10
2:1.18.4-0ubuntu0.11
2:1.18.4-0ubuntu0.12
2:1.18.4-0ubuntu0.12+esm1
2:1.18.4-0ubuntu0.12+esm2
2:1.18.4-0ubuntu0.12+esm4
2:1.18.4-0ubuntu0.12+esm5
2:1.18.4-0ubuntu0.12+esm6
2:1.18.4-0ubuntu0.12+esm8
2:1.18.4-0ubuntu0.12+esm9
2:1.18.4-0ubuntu0.12+esm10
2:1.18.4-0ubuntu0.12+esm12
2:1.18.4-0ubuntu0.12+esm13
2:1.18.4-0ubuntu0.12+esm14
2:1.18.4-0ubuntu0.12+esm15
2:1.18.4-0ubuntu0.12+esm16
2:1.18.4-0ubuntu0.12+esm17
2:1.18.4-0ubuntu0.12+esm18

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.18.4-1ubuntu6.1~16.04.1
2:1.18.4-1ubuntu6.1~16.04.2
2:1.19.3-1ubuntu1~16.04.2
2:1.19.3-1ubuntu1~16.04.3
2:1.19.3-1ubuntu1~16.04.4
2:1.19.5-0ubuntu2~16.04.1
2:1.19.6-1ubuntu4~16.04.1
2:1.19.6-1ubuntu4.1~16.04.1
2:1.19.6-1ubuntu4.1~16.04.2
2:1.19.6-1ubuntu4.1~16.04.3
2:1.19.6-1ubuntu4.1~16.04.4
2:1.19.6-1ubuntu4.1~16.04.5
2:1.19.6-1ubuntu4.1~16.04.6
2:1.19.6-1ubuntu4.1~16.04.6+esm1
2:1.19.6-1ubuntu4.1~16.04.6+esm3
2:1.19.6-1ubuntu4.1~16.04.6+esm4
2:1.19.6-1ubuntu4.1~16.04.6+esm5
2:1.19.6-1ubuntu4.1~16.04.6+esm6
2:1.19.6-1ubuntu4.1~16.04.6+esm7
2:1.19.6-1ubuntu4.1~16.04.6+esm8
2:1.19.6-1ubuntu4.1~16.04.6+esm9
2:1.19.6-1ubuntu4.1~16.04.6+esm10

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xmir-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xorg-server-source-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xephyr-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xwayland-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:Pro:18.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm13?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.19.5-0ubuntu2
2:1.19.6-1ubuntu1
2:1.19.6-1ubuntu2
2:1.19.6-1ubuntu3
2:1.19.6-1ubuntu4
2:1.19.6-1ubuntu4.1
2:1.19.6-1ubuntu4.2
2:1.19.6-1ubuntu4.3
2:1.19.6-1ubuntu4.4
2:1.19.6-1ubuntu4.5
2:1.19.6-1ubuntu4.6
2:1.19.6-1ubuntu4.7
2:1.19.6-1ubuntu4.8
2:1.19.6-1ubuntu4.9
2:1.19.6-1ubuntu4.10
2:1.19.6-1ubuntu4.11
2:1.19.6-1ubuntu4.12
2:1.19.6-1ubuntu4.13
2:1.19.6-1ubuntu4.14
2:1.19.6-1ubuntu4.15
2:1.19.6-1ubuntu4.15+esm1
2:1.19.6-1ubuntu4.15+esm3
2:1.19.6-1ubuntu4.15+esm4
2:1.19.6-1ubuntu4.15+esm5
2:1.19.6-1ubuntu4.15+esm7
2:1.19.6-1ubuntu4.15+esm8
2:1.19.6-1ubuntu4.15+esm9
2:1.19.6-1ubuntu4.15+esm10
2:1.19.6-1ubuntu4.15+esm11
2:1.19.6-1ubuntu4.15+esm12
2:1.19.6-1ubuntu4.15+esm13

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
xorg-server-hwe-18.04

Package

Name
xorg-server-hwe-18.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.1-3ubuntu2.1~18.04.1
2:1.20.4-1ubuntu3~18.04.1
2:1.20.5+git20191008-0ubuntu1~18.04.1
2:1.20.8-2ubuntu2.1~18.04.1
2:1.20.8-2ubuntu2.2~18.04.1
2:1.20.8-2ubuntu2.2~18.04.2
2:1.20.8-2ubuntu2.2~18.04.3
2:1.20.8-2ubuntu2.2~18.04.4
2:1.20.8-2ubuntu2.2~18.04.5
2:1.20.8-2ubuntu2.2~18.04.6
2:1.20.8-2ubuntu2.2~18.04.7
2:1.20.8-2ubuntu2.2~18.04.8
2:1.20.8-2ubuntu2.2~18.04.9
2:1.20.8-2ubuntu2.2~18.04.10
2:1.20.8-2ubuntu2.2~18.04.11
2:1.20.8-2ubuntu2.2~18.04.11+esm1
2:1.20.8-2ubuntu2.2~18.04.11+esm2
2:1.20.8-2ubuntu2.2~18.04.11+esm3
2:1.20.8-2ubuntu2.2~18.04.11+esm4
2:1.20.8-2ubuntu2.2~18.04.11+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xorg-server-source-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xephyr-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xwayland-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"
Ubuntu:Pro:20.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.20+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.5+git20191008-0ubuntu1
2:1.20.6-1ubuntu1
2:1.20.7-2ubuntu1
2:1.20.7-2ubuntu2
2:1.20.8-2ubuntu2
2:1.20.8-2ubuntu2.1
2:1.20.8-2ubuntu2.2
2:1.20.8-2ubuntu2.3
2:1.20.8-2ubuntu2.4
2:1.20.8-2ubuntu2.6
2:1.20.9-2ubuntu1.1~20.04.1
2:1.20.9-2ubuntu1.2~20.04.1
2:1.20.9-2ubuntu1.2~20.04.2
2:1.20.11-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.3
2:1.20.13-1ubuntu1~20.04.4
2:1.20.13-1ubuntu1~20.04.5
2:1.20.13-1ubuntu1~20.04.6
2:1.20.13-1ubuntu1~20.04.8
2:1.20.13-1ubuntu1~20.04.9
2:1.20.13-1ubuntu1~20.04.12
2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.15
2:1.20.13-1ubuntu1~20.04.16
2:1.20.13-1ubuntu1~20.04.17
2:1.20.13-1ubuntu1~20.04.18
2:1.20.13-1ubuntu1~20.04.19
2:1.20.13-1ubuntu1~20.04.20
2:1.20.13-1ubuntu1~20.04.20+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34000.json"