First published: Fri Oct 26 2018(Updated: )
Narendra Shinde discovered that the X.Org X server incorrectly handled certain command line parameters when running as root with the legacy wrapper. When certain graphics drivers are being used, a local attacker could possibly use this issue to overwrite arbitrary files and escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xserver-xorg-core | <2:1.20.1-3ubuntu2.1 | 2:1.20.1-3ubuntu2.1 |
=18.10 | ||
All of | ||
ubuntu/xserver-xorg-core | <2:1.19.6-1ubuntu4.2 | 2:1.19.6-1ubuntu4.2 |
=18.04 | ||
All of | ||
ubuntu/xserver-xorg-core-hwe-16.04 | <2:1.19.6-1ubuntu4.1~16.04.2 | 2:1.19.6-1ubuntu4.1~16.04.2 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3802-1
A local attacker could exploit this vulnerability to overwrite arbitrary files and escalate privileges.
Ubuntu 18.10, Ubuntu 18.04, and Ubuntu 16.04 are affected.
Update xserver-xorg-core package to version 2:1.20.1-3ubuntu2.1 for Ubuntu 18.10, version 2:1.19.6-1ubuntu4.2 for Ubuntu 18.04, and version 2:1.19.6-1ubuntu4.1~16.04.2 for Ubuntu 16.04.
You can find more information about the USN-3802-1 vulnerability on the Ubuntu security website.