Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in X.Org (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in X.Org (Aktualisierung)
ID: USN-4905-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 ESM
Datum: Mi, 30. Juni 2021, 19:39
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
Applikationen: X11
Update von: Ausführen von Code mit höheren Privilegien in X.Org

Originalnachricht


--===============6151669747238718429==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="XsQoSWH+UP9D9v3l"
Content-Disposition: inline


--XsQoSWH+UP9D9v3l
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4905-2
June 30, 2021

xorg-server vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

X.Org X Server could be made to crash or run programs if it received
specially crafted input.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-4905-1 fixed a vulnerability in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
xserver-xorg-core 2:1.15.1-0ubuntu2.11+esm4

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4905-2
https://ubuntu.com/security/notices/USN-4905-1
CVE-2021-3472

--XsQoSWH+UP9D9v3l
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=rSH7
-----END PGP SIGNATURE-----

--XsQoSWH+UP9D9v3l--


--===============6151669747238718429==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung