USN-4488-1: X.Org X Server vulnerabilities
2 September 2020
Several security issues were fixed in X.Org X Server.
Releases
Packages
- xorg-server - X.Org X11 server
- xorg-server-hwe-16.04 - X.Org X11 server
- xorg-server-hwe-18.04 - X.Org X11 server
Details
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the
input extension protocol. A local attacker could possibly use this issue to
escalate privileges. (CVE-2020-14346)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly initialized
memory. A local attacker could possibly use this issue to obtain sensitive
information. (CVE-2020-14347)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the
XkbSelectEvents function. A local attacker could possibly use this issue to
escalate privileges. (CVE-2020-14361)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the
XRecordRegisterClients function. A local attacker could possibly use this
issue to escalate privileges. (CVE-2020-14362)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-4488-2: xserver-xorg-dev, xnest, xdmx, xserver-common, xserver-xorg-core, xdmx-tools, xserver-xorg-xmir, xvfb, xorg-server-source, xorg-server, xserver-xephyr, xserver-xorg-core-udeb