Your submission was sent successfully! Close

USN-4905-2: X.Org X Server vulnerability

30 June 2021

X.Org X Server could be made to crash or run programs if it received specially crafted input.




USN-4905-1 fixed a vulnerability in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

After a standard system update you need to reboot your computer to make all
the necessary changes.


Related notices

  • USN-4905-1: xserver-xorg-core-hwe-18.04, xserver-xorg-core-udeb, xserver-xorg-xmir, xorg-server-source, xorg-server-hwe-16.04, xserver-xorg-legacy-hwe-16.04, xwayland-hwe-18.04, xserver-xorg-core-hwe-16.04, xserver-xorg-legacy-hwe-18.04, xserver-xephyr, xmir-hwe-16.04, xvfb, xserver-xorg-dev-hwe-16.04, xserver-xorg-dev, xserver-xephyr-hwe-18.04, xserver-xorg-legacy, xmir, xdmx, xdmx-tools, xserver-xephyr-hwe-16.04, xorg-server, xorg-server-source-hwe-16.04, xwayland, xwayland-hwe-16.04, xserver-common, xorg-server-hwe-18.04, xnest, xserver-xorg-dev-hwe-18.04, xorg-server-source-hwe-18.04, xserver-xorg-core