Ubuntu 6685 Published by

Ubuntu Linux has received updates addressing multiple vulnerabilities, including issues with the X.Org X Server, RESTEasy, FreeType, and PlantUML:

[USN-7299-4] X.Org X Server regression
[USN-7351-1] RESTEasy vulnerabilities
[USN-7352-1] FreeType vulnerability
[USN-7353-1] PlantUML vulnerability
[USN-7352-2] FreeType vulnerabilities




[USN-7299-4] X.Org X Server regression


==========================================================================
Ubuntu Security Notice USN-7299-4
March 17, 2025

xorg-server, xorg-server-hwe-16.04, xorg-server-hwe-18.04 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server
- xorg-server-hwe-18.04: X.Org X11 server
- xorg-server-hwe-16.04: X.Org X11 server

Details:

USN-7299-2 fix vulnerabilities in X.Org X Server. This fix caused
a regression in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This update
fix the regression and re-apply the fix for the CVE listed.

We apologize for the inconvenience.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain memory operations. An attacker could use these issues to cause the
X Server to crash, leading to a denial of service, or possibly execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
xserver-xorg-core 2:1.19.6-1ubuntu4.15+esm12
Available with Ubuntu Pro
xserver-xorg-core-hwe-18.04 2:1.20.8-2ubuntu2.2~18.04.11+esm4
Available with Ubuntu Pro
xwayland 2:1.19.6-1ubuntu4.15+esm12
Available with Ubuntu Pro
xwayland-hwe-18.04 2:1.20.8-2ubuntu2.2~18.04.11+esm4
Available with Ubuntu Pro

Ubuntu 16.04 LTS
xserver-xorg-core 2:1.18.4-0ubuntu0.12+esm17
Available with Ubuntu Pro
xserver-xorg-core-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6+esm9
Available with Ubuntu Pro
xwayland 2:1.18.4-0ubuntu0.12+esm17
Available with Ubuntu Pro
xwayland-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6+esm9
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7299-4
https://ubuntu.com/security/notices/USN-7299-3
https://ubuntu.com/security/notices/USN-7299-2
https://ubuntu.com/security/notices/USN-7299-1
CVE-2025-26594, CVE-2025-26595, CVE-2025-26596, CVE-2025-26597,
CVE-2025-26598, CVE-2025-26599, CVE-2025-26600, CVE-2025-26601,
https://launchpad.net/bugs/2102209



[USN-7351-1] RESTEasy vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7351-1
March 13, 2025

resteasy vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in RESTEasy.

Software Description:
- resteasy: RESTEasy -- Framework for RESTful Web services and Java applications

Details:

Nikos Papadopoulos discovered that RESTEasy improperly handled URL encoding
when certain errors occur. An attacker could possibly use this issue to
modify the app's behavior for other users through the network.
(CVE-2020-10688)

Mirko Selber discovered that RESTEasy improperly validated user input
during HTTP response construction. This issue could possibly allow an
attacker to cause a denial of service or execute arbitrary code.
(CVE-2020-1695)

It was discovered that RESTEasy unintentionally disclosed potentially
sensitive server information to users during the handling of certain
errors. (CVE-2020-25633)

It was discovered that RESTEasy unintentionally disclosed parts of its code
to users during the handling of certain errors. (CVE-2021-20289)

It was discovered that RESTEasy used improper permissions when creating
temporary files. An attacker could possibly use this issue to get access to
sensitive data. (CVE-2023-0482)

It was discovered that RESTEasy improperly handled certain HTTP requests
and could be forced into a state in which it can no longer accept incoming
connections. An attacker could possibly use this issue to cause a denial of
service. (CVE-2024-9622)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
libresteasy-java 3.6.2-2ubuntu0.24.10.1

Ubuntu 24.04 LTS
libresteasy-java 3.6.2-2ubuntu0.24.04.1~esm1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
libresteasy-java 3.6.2-2ubuntu0.22.04.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libresteasy-java 3.6.2-2ubuntu0.20.04.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7351-1
CVE-2020-10688, CVE-2020-1695, CVE-2020-25633, CVE-2021-20289,
CVE-2023-0482, CVE-2024-9622

Package Information:
https://launchpad.net/ubuntu/+source/resteasy/3.6.2-2ubuntu0.24.10.1



[USN-7352-1] FreeType vulnerability


==========================================================================
Ubuntu Security Notice USN-7352-1
March 17, 2025

freetype vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

FreeType could be made to crash or run programs if it opened a specially
crafted font file.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

It was discovered that FreeType incorrectly handled certain memory
operations when parsing font subglyph structures. A remote attacker could
use this issue to cause FreeType to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
libfreetype6 2.11.1+dfsg-1ubuntu0.3

Ubuntu 20.04 LTS
libfreetype6 2.10.1-2ubuntu0.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7352-1
CVE-2025-27363

Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.11.1+dfsg-1ubuntu0.3
https://launchpad.net/ubuntu/+source/freetype/2.10.1-2ubuntu0.4



[USN-7353-1] PlantUML vulnerability


==========================================================================
Ubuntu Security Notice USN-7353-1
March 17, 2025

plantuml vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

PlantUML could be made to crash or run programs as your login if it
opened a specially crafted UML file.

Software Description:
- plantuml: text-to-UML converter

Details:

Tobias S. Fink discovered that PlantUML was susceptible to cross-site
scripting attacks (XSS) in instances where SVG images were rendered.
An attacker could possibly use this issue to cause PlantUML to crash,
resulting in a denial of service, or the execution of arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  plantuml                        1:1.2020.2+ds-5ubuntu0.1

Ubuntu 24.04 LTS
  plantuml                        1:1.2020.2+ds-3ubuntu1.1

Ubuntu 22.04 LTS
  plantuml                        1:1.2020.2+ds-1ubuntu0.1

Ubuntu 20.04 LTS
  plantuml                        1:1.2018.13+ds-2ubuntu0.1~esm1
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  plantuml                        1:1.2017.15-1ubuntu0.1~esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  plantuml                        8024-2ubuntu0.1~esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7353-1
  CVE-2022-1231

Package Information:
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-5ubuntu0.1
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-3ubuntu1.1
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-1ubuntu0.1



[USN-7352-2] FreeType vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7352-2
March 17, 2025

freetype vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in FreeType.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

USN-7352-1 fixed a vulnerability in FreeType. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This
update also fixes an additional vulnerability in Ubuntu 14.04 LTS.

Original advisory details:

 It was discovered that FreeType incorrectly handled certain memory
 operations when parsing font subglyph structures. A remote attacker could
 use this issue to cause FreeType to crash, resulting in a denial of
 service, or possibly execute arbitrary code. This issue only affected
 Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2025-27363)

Additional advisory details:

 It was discovered that FreeType incorrectly handled certain memory
 operations during typical execution. An attacker could possibly use
 this issue to cause FreeType to crash, resulting in a denial of
 service. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-27406)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  libfreetype6                    2.8.1-2ubuntu2.2+esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libfreetype6                    2.6.1-0.1ubuntu2.5+esm2
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  libfreetype6                    2.5.2-1ubuntu2.8+esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7352-2
  https://ubuntu.com/security/notices/USN-7352-1
  CVE-2022-27406, CVE-2025-27363