[USN-7299-4] X.Org X Server regression
[USN-7351-1] RESTEasy vulnerabilities
[USN-7352-1] FreeType vulnerability
[USN-7353-1] PlantUML vulnerability
[USN-7352-2] FreeType vulnerabilities
[USN-7299-4] X.Org X Server regression
==========================================================================
Ubuntu Security Notice USN-7299-4
March 17, 2025
xorg-server, xorg-server-hwe-16.04, xorg-server-hwe-18.04 regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in X.Org X Server.
Software Description:
- xorg-server: X.Org X11 server
- xorg-server-hwe-18.04: X.Org X11 server
- xorg-server-hwe-16.04: X.Org X11 server
Details:
USN-7299-2 fix vulnerabilities in X.Org X Server. This fix caused
a regression in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This update
fix the regression and re-apply the fix for the CVE listed.
We apologize for the inconvenience.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain memory operations. An attacker could use these issues to cause the
X Server to crash, leading to a denial of service, or possibly execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
xserver-xorg-core 2:1.19.6-1ubuntu4.15+esm12
Available with Ubuntu Pro
xserver-xorg-core-hwe-18.04 2:1.20.8-2ubuntu2.2~18.04.11+esm4
Available with Ubuntu Pro
xwayland 2:1.19.6-1ubuntu4.15+esm12
Available with Ubuntu Pro
xwayland-hwe-18.04 2:1.20.8-2ubuntu2.2~18.04.11+esm4
Available with Ubuntu Pro
Ubuntu 16.04 LTS
xserver-xorg-core 2:1.18.4-0ubuntu0.12+esm17
Available with Ubuntu Pro
xserver-xorg-core-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6+esm9
Available with Ubuntu Pro
xwayland 2:1.18.4-0ubuntu0.12+esm17
Available with Ubuntu Pro
xwayland-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6+esm9
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7299-4
https://ubuntu.com/security/notices/USN-7299-3
https://ubuntu.com/security/notices/USN-7299-2
https://ubuntu.com/security/notices/USN-7299-1
CVE-2025-26594, CVE-2025-26595, CVE-2025-26596, CVE-2025-26597,
CVE-2025-26598, CVE-2025-26599, CVE-2025-26600, CVE-2025-26601,
https://launchpad.net/bugs/2102209
[USN-7351-1] RESTEasy vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7351-1
March 13, 2025
resteasy vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in RESTEasy.
Software Description:
- resteasy: RESTEasy -- Framework for RESTful Web services and Java applications
Details:
Nikos Papadopoulos discovered that RESTEasy improperly handled URL encoding
when certain errors occur. An attacker could possibly use this issue to
modify the app's behavior for other users through the network.
(CVE-2020-10688)
Mirko Selber discovered that RESTEasy improperly validated user input
during HTTP response construction. This issue could possibly allow an
attacker to cause a denial of service or execute arbitrary code.
(CVE-2020-1695)
It was discovered that RESTEasy unintentionally disclosed potentially
sensitive server information to users during the handling of certain
errors. (CVE-2020-25633)
It was discovered that RESTEasy unintentionally disclosed parts of its code
to users during the handling of certain errors. (CVE-2021-20289)
It was discovered that RESTEasy used improper permissions when creating
temporary files. An attacker could possibly use this issue to get access to
sensitive data. (CVE-2023-0482)
It was discovered that RESTEasy improperly handled certain HTTP requests
and could be forced into a state in which it can no longer accept incoming
connections. An attacker could possibly use this issue to cause a denial of
service. (CVE-2024-9622)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
libresteasy-java 3.6.2-2ubuntu0.24.10.1
Ubuntu 24.04 LTS
libresteasy-java 3.6.2-2ubuntu0.24.04.1~esm1
Available with Ubuntu Pro
Ubuntu 22.04 LTS
libresteasy-java 3.6.2-2ubuntu0.22.04.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libresteasy-java 3.6.2-2ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7351-1
CVE-2020-10688, CVE-2020-1695, CVE-2020-25633, CVE-2021-20289,
CVE-2023-0482, CVE-2024-9622
Package Information:
https://launchpad.net/ubuntu/+source/resteasy/3.6.2-2ubuntu0.24.10.1
[USN-7352-1] FreeType vulnerability
==========================================================================
Ubuntu Security Notice USN-7352-1
March 17, 2025
freetype vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
FreeType could be made to crash or run programs if it opened a specially
crafted font file.
Software Description:
- freetype: FreeType 2 is a font engine library
Details:
It was discovered that FreeType incorrectly handled certain memory
operations when parsing font subglyph structures. A remote attacker could
use this issue to cause FreeType to crash, resulting in a denial of
service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
libfreetype6 2.11.1+dfsg-1ubuntu0.3
Ubuntu 20.04 LTS
libfreetype6 2.10.1-2ubuntu0.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7352-1
CVE-2025-27363
Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.11.1+dfsg-1ubuntu0.3
https://launchpad.net/ubuntu/+source/freetype/2.10.1-2ubuntu0.4
[USN-7353-1] PlantUML vulnerability
==========================================================================
Ubuntu Security Notice USN-7353-1
March 17, 2025
plantuml vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
PlantUML could be made to crash or run programs as your login if it
opened a specially crafted UML file.
Software Description:
- plantuml: text-to-UML converter
Details:
Tobias S. Fink discovered that PlantUML was susceptible to cross-site
scripting attacks (XSS) in instances where SVG images were rendered.
An attacker could possibly use this issue to cause PlantUML to crash,
resulting in a denial of service, or the execution of arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
plantuml 1:1.2020.2+ds-5ubuntu0.1
Ubuntu 24.04 LTS
plantuml 1:1.2020.2+ds-3ubuntu1.1
Ubuntu 22.04 LTS
plantuml 1:1.2020.2+ds-1ubuntu0.1
Ubuntu 20.04 LTS
plantuml 1:1.2018.13+ds-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
plantuml 1:1.2017.15-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
plantuml 8024-2ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7353-1
CVE-2022-1231
Package Information:
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-5ubuntu0.1
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-3ubuntu1.1
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-1ubuntu0.1
[USN-7352-2] FreeType vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7352-2
March 17, 2025
freetype vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in FreeType.
Software Description:
- freetype: FreeType 2 is a font engine library
Details:
USN-7352-1 fixed a vulnerability in FreeType. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This
update also fixes an additional vulnerability in Ubuntu 14.04 LTS.
Original advisory details:
It was discovered that FreeType incorrectly handled certain memory
operations when parsing font subglyph structures. A remote attacker could
use this issue to cause FreeType to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2025-27363)
Additional advisory details:
It was discovered that FreeType incorrectly handled certain memory
operations during typical execution. An attacker could possibly use
this issue to cause FreeType to crash, resulting in a denial of
service. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-27406)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
libfreetype6 2.8.1-2ubuntu2.2+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libfreetype6 2.6.1-0.1ubuntu2.5+esm2
Available with Ubuntu Pro
Ubuntu 14.04 LTS
libfreetype6 2.5.2-1ubuntu2.8+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7352-2
https://ubuntu.com/security/notices/USN-7352-1
CVE-2022-27406, CVE-2025-27363