First published: Tue Oct 31 2023(Updated: )
USN-6453-1 fixed several vulnerabilities in X.Org. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled prepending values to certain properties. An attacker could possibly use this issue to cause the X Server to crash, execute arbitrary code, or escalate privileges. (CVE-2023-5367) Sri discovered that the X.Org X Server incorrectly handled detroying windows in certain legacy multi-screen setups. An attacker could possibly use this issue to cause the X Server to crash, execute arbitrary code, or escalate privileges. (CVE-2023-5380)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xserver-xorg-core | <2:1.19.6-1ubuntu4.15+esm1 | 2:1.19.6-1ubuntu4.15+esm1 |
=18.04 | ||
All of | ||
ubuntu/xwayland | <2:1.19.6-1ubuntu4.15+esm1 | 2:1.19.6-1ubuntu4.15+esm1 |
=18.04 | ||
All of | ||
ubuntu/xserver-xorg-core | <2:1.18.4-0ubuntu0.12+esm6 | 2:1.18.4-0ubuntu0.12+esm6 |
=16.04 | ||
All of | ||
ubuntu/xwayland | <2:1.18.4-0ubuntu0.12+esm6 | 2:1.18.4-0ubuntu0.12+esm6 |
=16.04 | ||
All of | ||
ubuntu/xserver-xorg-core | <2:1.15.1-0ubuntu2.11+esm8 | 2:1.15.1-0ubuntu2.11+esm8 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6453-2
X.Org X Server, xserver-xorg-core, xwayland
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
The severity of the vulnerability is not mentioned in the advisory.
To fix the vulnerabilities, you need to update the affected packages to the specified versions mentioned in the advisory.