{"id":"USN-7573-1","summary":"xorg-server, xwayland vulnerabilities","details":"Nils Emmerich discovered that the X.Org X Server incorrectly handled\ncertain memory operations. An attacker could use these issues to cause the\nX Server to crash, leading to a denial of service, obtain sensitive\ninformation, or possibly execute arbitrary code.\n","modified":"2026-02-10T04:48:59Z","published":"2025-06-17T14:31:12Z","related":["UBUNTU-CVE-2025-49175","UBUNTU-CVE-2025-49176","UBUNTU-CVE-2025-49177","UBUNTU-CVE-2025-49178","UBUNTU-CVE-2025-49179","UBUNTU-CVE-2025-49180"],"upstream":["CVE-2025-49175","CVE-2025-49176","CVE-2025-49177","CVE-2025-49178","CVE-2025-49179","CVE-2025-49180","UBUNTU-CVE-2025-49175","UBUNTU-CVE-2025-49176","UBUNTU-CVE-2025-49177","UBUNTU-CVE-2025-49178","UBUNTU-CVE-2025-49179","UBUNTU-CVE-2025-49180"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7573-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49175"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49177"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49178"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49179"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49180"}],"affected":[{"package":{"name":"xorg-server","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.15?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:21.1.4-2ubuntu1.7~22.04.15"}]}],"versions":["2:1.20.13-1ubuntu1","2:1.20.13-1ubuntu2","2:1.20.14-1ubuntu1","2:21.1.3-2ubuntu2","2:21.1.3-2ubuntu2.1","2:21.1.3-2ubuntu2.2","2:21.1.3-2ubuntu2.3","2:21.1.3-2ubuntu2.4","2:21.1.3-2ubuntu2.5","2:21.1.3-2ubuntu2.6","2:21.1.3-2ubuntu2.7","2:21.1.3-2ubuntu2.8","2:21.1.3-2ubuntu2.9","2:21.1.4-2ubuntu1.7~22.04.1","2:21.1.4-2ubuntu1.7~22.04.2","2:21.1.4-2ubuntu1.7~22.04.5","2:21.1.4-2ubuntu1.7~22.04.7","2:21.1.4-2ubuntu1.7~22.04.8","2:21.1.4-2ubuntu1.7~22.04.9","2:21.1.4-2ubuntu1.7~22.04.10","2:21.1.4-2ubuntu1.7~22.04.11","2:21.1.4-2ubuntu1.7~22.04.12","2:21.1.4-2ubuntu1.7~22.04.13","2:21.1.4-2ubuntu1.7~22.04.14"],"ecosystem_specific":{"binaries":[{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xnest"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xorg-server-source"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xserver-common"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xserver-xephyr"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xserver-xorg-core"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xserver-xorg-dev"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.15","binary_name":"xvfb"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7573-1.json","cves_map":{"cves":[{"id":"CVE-2025-49175","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49176","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49177","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49178","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49179","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49180","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.19?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:22.1.1-1ubuntu0.19"}]}],"versions":["2:21.1.2-0ubuntu1","2:21.1.3-1","2:21.1.3-1ubuntu1","2:21.1.4-1","2:22.1.0-1","2:22.1.1-1","2:22.1.1-1ubuntu0.1","2:22.1.1-1ubuntu0.2","2:22.1.1-1ubuntu0.3","2:22.1.1-1ubuntu0.4","2:22.1.1-1ubuntu0.5","2:22.1.1-1ubuntu0.6","2:22.1.1-1ubuntu0.7","2:22.1.1-1ubuntu0.9","2:22.1.1-1ubuntu0.10","2:22.1.1-1ubuntu0.11","2:22.1.1-1ubuntu0.12","2:22.1.1-1ubuntu0.13","2:22.1.1-1ubuntu0.14","2:22.1.1-1ubuntu0.15","2:22.1.1-1ubuntu0.17","2:22.1.1-1ubuntu0.18"],"ecosystem_specific":{"binaries":[{"binary_version":"2:22.1.1-1ubuntu0.19","binary_name":"xwayland"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7573-1.json","cves_map":{"cves":[{"id":"CVE-2025-49175","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49176","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49177","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49178","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49179","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49180","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.4?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:21.1.12-1ubuntu1.4"}]}],"versions":["2:21.1.7-3ubuntu2","2:21.1.7-3ubuntu2.1","2:21.1.10-1ubuntu1","2:21.1.11-2ubuntu1","2:21.1.12-1ubuntu1","2:21.1.12-1ubuntu1.1","2:21.1.12-1ubuntu1.2","2:21.1.12-1ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xnest"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xorg-server-source"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xserver-common"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xserver-xephyr"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xserver-xorg-core"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xserver-xorg-dev"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:21.1.12-1ubuntu1.4","binary_name":"xvfb"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7573-1.json","cves_map":{"cves":[{"id":"CVE-2025-49175","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49176","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49177","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49178","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49179","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49180","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:24.04:LTS"}}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.6?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:23.2.6-1ubuntu0.6"}]}],"versions":["2:23.2.0-1","2:23.2.0-1ubuntu0.1","2:23.2.3-1","2:23.2.4-1","2:23.2.4-1build1","2:23.2.4-1build2","2:23.2.4-1build3","2:23.2.6-1","2:23.2.6-1ubuntu0.1","2:23.2.6-1ubuntu0.2","2:23.2.6-1ubuntu0.4","2:23.2.6-1ubuntu0.5"],"ecosystem_specific":{"binaries":[{"binary_version":"2:23.2.6-1ubuntu0.6","binary_name":"xwayland"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7573-1.json","cves_map":{"cves":[{"id":"CVE-2025-49175","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49176","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49177","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49178","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49179","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-49180","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:24.04:LTS"}}}],"schema_version":"1.7.3"}