[USN-7555-3] Django vulnerability
[USN-7573-1] X.Org X Server vulnerabilities
[USN-7555-3] Django vulnerability
==========================================================================
Ubuntu Security Notice USN-7555-3
June 17, 2025
python-django vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Django could be made to log injection if received specially
crafted input.
Software Description:
- python-django: High-level Python web development framework
Details:
USN-7555-1 fixed a vulnerability in Django. This update provides an
additional fix for Ubuntu 20.04 LTS.
Original advisory details:
It was discovered that Django incorrectly handled certain
unescaped request paths. An attacker could possibly use this
issue to perform a log injection.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
python3-django 2:2.2.12-1ubuntu0.29+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7555-3
https://ubuntu.com/security/notices/USN-7555-2
https://ubuntu.com/security/notices/USN-7555-1
https://launchpad.net/bugs/2113924
[USN-7573-1] X.Org X Server vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7573-1
June 17, 2025
xorg-server, xwayland vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in X.Org X Server.
Software Description:
- xorg-server: X.Org X11 server
- xwayland: X server for running X clients under Wayland
Details:
Nils Emmerich discovered that the X.Org X Server incorrectly handled
certain memory operations. An attacker could use these issues to cause the
X Server to crash, leading to a denial of service, obtain sensitive
information, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
xserver-xorg-core 2:21.1.16-1ubuntu1.1
xwayland 2:24.1.6-1ubuntu0.1
Ubuntu 24.10
xserver-xorg-core 2:21.1.13-2ubuntu1.4
xwayland 2:24.1.2-1ubuntu0.6
Ubuntu 24.04 LTS
xserver-xorg-core 2:21.1.12-1ubuntu1.4
xwayland 2:23.2.6-1ubuntu0.6
Ubuntu 22.04 LTS
xserver-xorg-core 2:21.1.4-2ubuntu1.7~22.04.15
xwayland 2:22.1.1-1ubuntu0.19
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7573-1
CVE-2025-49175, CVE-2025-49176, CVE-2025-49177, CVE-2025-49178,
CVE-2025-49179, CVE-2025-49180
Package Information:
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.16-1ubuntu1.1
https://launchpad.net/ubuntu/+source/xwayland/2:24.1.6-1ubuntu0.1
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.13-2ubuntu1.4
https://launchpad.net/ubuntu/+source/xwayland/2:24.1.2-1ubuntu0.6
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.12-1ubuntu1.4
https://launchpad.net/ubuntu/+source/xwayland/2:23.2.6-1ubuntu0.6
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.4-2ubuntu1.7~22.04.15
https://launchpad.net/ubuntu/+source/xwayland/2:22.1.1-1ubuntu0.19