First published: Thu Jul 27 2023(Updated: )
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled certain inputs. An attacker could use this issue to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code and escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xserver-xorg-core-hwe-16.04 | <2:1.19.6-1ubuntu4.1~16.04.6+esm5 | 2:1.19.6-1ubuntu4.1~16.04.6+esm5 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-5193-3 is not specified in the information provided.
To fix USN-5193-3, update the affected software to version 2:1.19.6-1ubuntu4.1~16.04.6+esm5.
USN-5193-3 refers to several vulnerabilities in X.Org X Server that could lead to server crashes and potentially be exploited by attackers.
Yes, you can find more information about USN-5193-3 at the following references: [Link 1](https://ubuntu.com/security/CVE-2021-4011), [Link 2](https://ubuntu.com/security/CVE-2021-4008), [Link 3](https://ubuntu.com/security/CVE-2021-4009).