USN-7085-2: X.Org X Server vulnerability
30 October 2024
X.Org X Server could be made to crash or run programs if it received specially crafted data.
Releases
Packages
- xorg-server - X.Org X11 server
- xorg-server-hwe-16.04 - X.Org X11 server
- xorg-server-hwe-18.04 - X.Org X11 server
Details
USN-7085-1 fixed a vulnerability in X.Org. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain memory operations in the X Keyboard Extension. An attacker could
use this issue to cause the X Server to crash, leading to a denial of
service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
xserver-xorg-core
-
2:1.19.6-1ubuntu4.15+esm9
Available with Ubuntu Pro
-
xserver-xorg-core-hwe-18.04
-
2:1.20.8-2ubuntu2.2~18.04.11+esm1
Available with Ubuntu Pro
-
xwayland
-
2:1.19.6-1ubuntu4.15+esm9
Available with Ubuntu Pro
-
xwayland-hwe-18.04
-
2:1.20.8-2ubuntu2.2~18.04.11+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
xserver-xorg-core
-
2:1.18.4-0ubuntu0.12+esm14
Available with Ubuntu Pro
-
xserver-xorg-core-hwe-16.04
-
2:1.19.6-1ubuntu4.1~16.04.6+esm6
Available with Ubuntu Pro
-
xwayland
-
2:1.18.4-0ubuntu0.12+esm14
Available with Ubuntu Pro
-
xwayland-hwe-16.04
-
2:1.19.6-1ubuntu4.1~16.04.6+esm6
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-7085-1: xserver-xorg-core, xserver-xorg-dev, xorg-server, xserver-common, xwayland, xdmx-tools, xorg-server-source, xvfb, xnest, xserver-xorg-legacy, xdmx, xserver-xephyr