USN-4905-2: X.Org X Server vulnerability

30 June 2021

X.Org X Server could be made to crash or run programs if it received specially crafted input.

Releases

Packages

Details

USN-4905-1 fixed a vulnerability in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

After a standard system update you need to reboot your computer to make all
the necessary changes.

References

Related notices

  • USN-4905-1: xorg-server, xserver-xorg-core-hwe-18.04, xserver-xorg-dev, xserver-common, xdmx-tools, xserver-xorg-core, xserver-xorg-core-udeb, xserver-xorg-xmir, xserver-xorg-dev-hwe-16.04, xserver-xorg-legacy-hwe-16.04, xserver-xorg-legacy-hwe-18.04, xserver-xorg-core-hwe-16.04, xorg-server-source-hwe-16.04, xwayland, xserver-xephyr-hwe-18.04, xdmx, xmir, xserver-xorg-legacy, xserver-xephyr-hwe-16.04, xserver-xorg-dev-hwe-18.04, xnest, xmir-hwe-16.04, xorg-server-hwe-18.04, xorg-server-hwe-16.04, xvfb, xorg-server-source, xserver-xephyr, xwayland-hwe-18.04, xorg-server-source-hwe-18.04, xwayland-hwe-16.04