UBUNTU-CVE-2026-34003

Source
https://ubuntu.com/security/CVE-2026-34003
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-34003
Upstream
  • CVE-2026-34003
Published
2026-04-14T00:00:00Z
Modified
2026-04-27T19:02:47.731336Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

XKB Buffer overflow in CheckKeyTypes(). The function CheckKeyTypes() will loop over the client's request but won't perform any additional bound checking to ensure that the data read remains within the request bounds. As a result, a specifically crafted request may cause CheckKeyTypes() to read uninitialised memory past the request data.

References

Affected packages

Ubuntu:22.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.16?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.13-1ubuntu1
2:1.20.13-1ubuntu2
2:1.20.14-1ubuntu1
2:21.*
2:21.1.3-2ubuntu2
2:21.1.3-2ubuntu2.1
2:21.1.3-2ubuntu2.2
2:21.1.3-2ubuntu2.3
2:21.1.3-2ubuntu2.4
2:21.1.3-2ubuntu2.5
2:21.1.3-2ubuntu2.6
2:21.1.3-2ubuntu2.7
2:21.1.3-2ubuntu2.8
2:21.1.3-2ubuntu2.9
2:21.1.4-2ubuntu1.7~22.04.1
2:21.1.4-2ubuntu1.7~22.04.2
2:21.1.4-2ubuntu1.7~22.04.5
2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.8
2:21.1.4-2ubuntu1.7~22.04.9
2:21.1.4-2ubuntu1.7~22.04.10
2:21.1.4-2ubuntu1.7~22.04.11
2:21.1.4-2ubuntu1.7~22.04.12
2:21.1.4-2ubuntu1.7~22.04.13
2:21.1.4-2ubuntu1.7~22.04.14
2:21.1.4-2ubuntu1.7~22.04.15
2:21.1.4-2ubuntu1.7~22.04.16

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.4-2ubuntu1.7~22.04.16"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.20?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.2-0ubuntu1
2:21.1.3-1
2:21.1.3-1ubuntu1
2:21.1.4-1
2:22.*
2:22.1.0-1
2:22.1.1-1
2:22.1.1-1ubuntu0.1
2:22.1.1-1ubuntu0.2
2:22.1.1-1ubuntu0.3
2:22.1.1-1ubuntu0.4
2:22.1.1-1ubuntu0.5
2:22.1.1-1ubuntu0.6
2:22.1.1-1ubuntu0.7
2:22.1.1-1ubuntu0.9
2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.11
2:22.1.1-1ubuntu0.12
2:22.1.1-1ubuntu0.13
2:22.1.1-1ubuntu0.14
2:22.1.1-1ubuntu0.15
2:22.1.1-1ubuntu0.17
2:22.1.1-1ubuntu0.18
2:22.1.1-1ubuntu0.19
2:22.1.1-1ubuntu0.20

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:22.1.1-1ubuntu0.20"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:24.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.7-3ubuntu2
2:21.1.7-3ubuntu2.1
2:21.1.10-1ubuntu1
2:21.1.11-2ubuntu1
2:21.1.12-1ubuntu1
2:21.1.12-1ubuntu1.1
2:21.1.12-1ubuntu1.2
2:21.1.12-1ubuntu1.3
2:21.1.12-1ubuntu1.4
2:21.1.12-1ubuntu1.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.12-1ubuntu1.5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:23.*
2:23.2.0-1
2:23.2.0-1ubuntu0.1
2:23.2.3-1
2:23.2.4-1
2:23.2.4-1build1
2:23.2.4-1build2
2:23.2.4-1build3
2:23.2.6-1
2:23.2.6-1ubuntu0.1
2:23.2.6-1ubuntu0.2
2:23.2.6-1ubuntu0.4
2:23.2.6-1ubuntu0.5
2:23.2.6-1ubuntu0.6
2:23.2.6-1ubuntu0.7
2:23.2.6-1ubuntu0.8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:23.2.6-1ubuntu0.8"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:25.10
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.18-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.16-1ubuntu1
2:21.1.18-1ubuntu1
2:21.1.18-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.18-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:24.1.6-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:24.*
2:24.1.6-1
2:24.1.6-1ubuntu1
2:24.1.6-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:24.1.6-1ubuntu1.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:26.04
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:21.1.22-1ubuntu1?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*
2:21.1.18-1ubuntu1
2:21.1.21-1ubuntu1
2:21.1.22-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xnest",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:21.1.22-1ubuntu1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:21.1.22-1ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xwayland

Package

Name
xwayland
Purl
pkg:deb/ubuntu/xwayland@2:24.1.10-1?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:24.*
2:24.1.6-1ubuntu1
2:24.1.8-1
2:24.1.9-1
2:24.1.10-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xwayland",
            "binary_version": "2:24.1.10-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:Pro:14.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7
2:1.15.1-0ubuntu2.9
2:1.15.1-0ubuntu2.10
2:1.15.1-0ubuntu2.11
2:1.15.1-0ubuntu2.11+esm2
2:1.15.1-0ubuntu2.11+esm3
2:1.15.1-0ubuntu2.11+esm4
2:1.15.1-0ubuntu2.11+esm5
2:1.15.1-0ubuntu2.11+esm6
2:1.15.1-0ubuntu2.11+esm7
2:1.15.1-0ubuntu2.11+esm8
2:1.15.1-0ubuntu2.11+esm9
2:1.15.1-0ubuntu2.11+esm11
2:1.15.1-0ubuntu2.11+esm12

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.15.1-0ubuntu2.11+esm12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:Pro:16.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm18?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2
2:1.18.4-0ubuntu0.3
2:1.18.4-0ubuntu0.4
2:1.18.4-0ubuntu0.6
2:1.18.4-0ubuntu0.7
2:1.18.4-0ubuntu0.8
2:1.18.4-0ubuntu0.9
2:1.18.4-0ubuntu0.10
2:1.18.4-0ubuntu0.11
2:1.18.4-0ubuntu0.12
2:1.18.4-0ubuntu0.12+esm1
2:1.18.4-0ubuntu0.12+esm2
2:1.18.4-0ubuntu0.12+esm4
2:1.18.4-0ubuntu0.12+esm5
2:1.18.4-0ubuntu0.12+esm6
2:1.18.4-0ubuntu0.12+esm8
2:1.18.4-0ubuntu0.12+esm9
2:1.18.4-0ubuntu0.12+esm10
2:1.18.4-0ubuntu0.12+esm12
2:1.18.4-0ubuntu0.12+esm13
2:1.18.4-0ubuntu0.12+esm14
2:1.18.4-0ubuntu0.12+esm15
2:1.18.4-0ubuntu0.12+esm16
2:1.18.4-0ubuntu0.12+esm17
2:1.18.4-0ubuntu0.12+esm18

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.18.4-0ubuntu0.12+esm18"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.18.4-1ubuntu6.1~16.04.1
2:1.18.4-1ubuntu6.1~16.04.2
2:1.19.3-1ubuntu1~16.04.2
2:1.19.3-1ubuntu1~16.04.3
2:1.19.3-1ubuntu1~16.04.4
2:1.19.5-0ubuntu2~16.04.1
2:1.19.6-1ubuntu4~16.04.1
2:1.19.6-1ubuntu4.1~16.04.1
2:1.19.6-1ubuntu4.1~16.04.2
2:1.19.6-1ubuntu4.1~16.04.3
2:1.19.6-1ubuntu4.1~16.04.4
2:1.19.6-1ubuntu4.1~16.04.5
2:1.19.6-1ubuntu4.1~16.04.6
2:1.19.6-1ubuntu4.1~16.04.6+esm1
2:1.19.6-1ubuntu4.1~16.04.6+esm3
2:1.19.6-1ubuntu4.1~16.04.6+esm4
2:1.19.6-1ubuntu4.1~16.04.6+esm5
2:1.19.6-1ubuntu4.1~16.04.6+esm6
2:1.19.6-1ubuntu4.1~16.04.6+esm7
2:1.19.6-1ubuntu4.1~16.04.6+esm8
2:1.19.6-1ubuntu4.1~16.04.6+esm9
2:1.19.6-1ubuntu4.1~16.04.6+esm10

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xmir-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xorg-server-source-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xephyr-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        },
        {
            "binary_name": "xwayland-hwe-16.04",
            "binary_version": "2:1.19.6-1ubuntu4.1~16.04.6+esm10"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:Pro:18.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm13?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.19.5-0ubuntu2
2:1.19.6-1ubuntu1
2:1.19.6-1ubuntu2
2:1.19.6-1ubuntu3
2:1.19.6-1ubuntu4
2:1.19.6-1ubuntu4.1
2:1.19.6-1ubuntu4.2
2:1.19.6-1ubuntu4.3
2:1.19.6-1ubuntu4.4
2:1.19.6-1ubuntu4.5
2:1.19.6-1ubuntu4.6
2:1.19.6-1ubuntu4.7
2:1.19.6-1ubuntu4.8
2:1.19.6-1ubuntu4.9
2:1.19.6-1ubuntu4.10
2:1.19.6-1ubuntu4.11
2:1.19.6-1ubuntu4.12
2:1.19.6-1ubuntu4.13
2:1.19.6-1ubuntu4.14
2:1.19.6-1ubuntu4.15
2:1.19.6-1ubuntu4.15+esm1
2:1.19.6-1ubuntu4.15+esm3
2:1.19.6-1ubuntu4.15+esm4
2:1.19.6-1ubuntu4.15+esm5
2:1.19.6-1ubuntu4.15+esm7
2:1.19.6-1ubuntu4.15+esm8
2:1.19.6-1ubuntu4.15+esm9
2:1.19.6-1ubuntu4.15+esm10
2:1.19.6-1ubuntu4.15+esm11
2:1.19.6-1ubuntu4.15+esm12
2:1.19.6-1ubuntu4.15+esm13

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xserver-xorg-xmir",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.19.6-1ubuntu4.15+esm13"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
xorg-server-hwe-18.04

Package

Name
xorg-server-hwe-18.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.1-3ubuntu2.1~18.04.1
2:1.20.4-1ubuntu3~18.04.1
2:1.20.5+git20191008-0ubuntu1~18.04.1
2:1.20.8-2ubuntu2.1~18.04.1
2:1.20.8-2ubuntu2.2~18.04.1
2:1.20.8-2ubuntu2.2~18.04.2
2:1.20.8-2ubuntu2.2~18.04.3
2:1.20.8-2ubuntu2.2~18.04.4
2:1.20.8-2ubuntu2.2~18.04.5
2:1.20.8-2ubuntu2.2~18.04.6
2:1.20.8-2ubuntu2.2~18.04.7
2:1.20.8-2ubuntu2.2~18.04.8
2:1.20.8-2ubuntu2.2~18.04.9
2:1.20.8-2ubuntu2.2~18.04.10
2:1.20.8-2ubuntu2.2~18.04.11
2:1.20.8-2ubuntu2.2~18.04.11+esm1
2:1.20.8-2ubuntu2.2~18.04.11+esm2
2:1.20.8-2ubuntu2.2~18.04.11+esm3
2:1.20.8-2ubuntu2.2~18.04.11+esm4
2:1.20.8-2ubuntu2.2~18.04.11+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xorg-server-source-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xephyr-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-core-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-dev-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xserver-xorg-legacy-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        },
        {
            "binary_name": "xwayland-hwe-18.04",
            "binary_version": "2:1.20.8-2ubuntu2.2~18.04.11+esm5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"
Ubuntu:Pro:20.04:LTS
xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.20+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:1.*
2:1.20.5+git20191008-0ubuntu1
2:1.20.6-1ubuntu1
2:1.20.7-2ubuntu1
2:1.20.7-2ubuntu2
2:1.20.8-2ubuntu2
2:1.20.8-2ubuntu2.1
2:1.20.8-2ubuntu2.2
2:1.20.8-2ubuntu2.3
2:1.20.8-2ubuntu2.4
2:1.20.8-2ubuntu2.6
2:1.20.9-2ubuntu1.1~20.04.1
2:1.20.9-2ubuntu1.2~20.04.1
2:1.20.9-2ubuntu1.2~20.04.2
2:1.20.11-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.2
2:1.20.13-1ubuntu1~20.04.3
2:1.20.13-1ubuntu1~20.04.4
2:1.20.13-1ubuntu1~20.04.5
2:1.20.13-1ubuntu1~20.04.6
2:1.20.13-1ubuntu1~20.04.8
2:1.20.13-1ubuntu1~20.04.9
2:1.20.13-1ubuntu1~20.04.12
2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.15
2:1.20.13-1ubuntu1~20.04.16
2:1.20.13-1ubuntu1~20.04.17
2:1.20.13-1ubuntu1~20.04.18
2:1.20.13-1ubuntu1~20.04.19
2:1.20.13-1ubuntu1~20.04.20
2:1.20.13-1ubuntu1~20.04.20+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "xdmx",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xdmx-tools",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xnest",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xorg-server-source",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-common",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xephyr",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-core",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xserver-xorg-legacy",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xvfb",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        },
        {
            "binary_name": "xwayland",
            "binary_version": "2:1.20.13-1ubuntu1~20.04.20+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34003.json"