First published: Wed Jan 26 2022(Updated: )
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain inputs. An attacker could use this issue to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code and escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xserver-xorg-core | <2:1.18.4-0ubuntu0.12+esm1 | 2:1.18.4-0ubuntu0.12+esm1 |
=16.04 | ||
All of | ||
ubuntu/xserver-xorg-core | <2:1.15.1-0ubuntu2.11+esm5 | 2:1.15.1-0ubuntu2.11+esm5 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for X.Org X Server vulnerabilities is USN-5193-2.
The X.Org X Server vulnerabilities affect Ubuntu 14.04 ESM with xserver-xorg-core version 2:1.15.1-0ubuntu2.11+esm5 and Ubuntu 16.04 ESM with xserver-xorg-core version 2:1.18.4-0ubuntu0.12+esm1.
The fixes for the X.Org X Server vulnerabilities can be obtained through the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
The severity of the X.Org X Server vulnerabilities is not specified in the provided information.
More information about the X.Org X Server vulnerabilities can be found on the Ubuntu Security Notices website.