USN-4905-2: X.Org X Server vulnerability
30 June 2021
X.Org X Server could be made to crash or run programs if it received specially crafted input.
Releases
Packages
- xorg-server - X.Org X11 server
Details
USN-4905-1 fixed a vulnerability in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
xserver-xorg-core
-
2:1.15.1-0ubuntu2.11+esm4
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-4905-1: xserver-common, xdmx-tools, xwayland, xserver-xorg-core-udeb, xserver-xorg-legacy-hwe-18.04, xserver-xephyr-hwe-16.04, xserver-xorg-core-hwe-18.04, xserver-xorg-legacy-hwe-16.04, xserver-xorg-dev-hwe-18.04, xwayland-hwe-18.04, xserver-xorg-core-hwe-16.04, xnest, xmir, xorg-server-source-hwe-18.04, xorg-server-hwe-18.04, xserver-xephyr, xorg-server, xorg-server-hwe-16.04, xorg-server-source-hwe-16.04, xdmx, xserver-xorg-dev-hwe-16.04, xvfb, xserver-xorg-legacy, xserver-xorg-core, xorg-server-source, xserver-xorg-dev, xserver-xorg-xmir, xwayland-hwe-16.04, xmir-hwe-16.04, xserver-xephyr-hwe-18.04