This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3137730012981569842==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="wPvQQvJ34JCBeFS2lAk5pi3g5ycKUrzyW"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--wPvQQvJ34JCBeFS2lAk5pi3g5ycKUrzyW
Content-Type: multipart/mixed; boundary="XkVfdrIIouwAmxhZGdR49xukbCySccdvc";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: "ubuntu-security-announce@lists.ubuntu.com"
Message-ID: <32211b30-3301-b4ba-d482-9542a612f8f7@canonical.com>
Subject: [USN-4905-1] X.Org X Server vulnerability
--XkVfdrIIouwAmxhZGdR49xukbCySccdvc
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-4905-1
April 13, 2021
xorg-server, xorg-server-hwe-16.04, xorg-server-hwe-18.04 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
X.Org X Server could be made to crash or run programs if it received
specially crafted input.
Software Description:
- xorg-server: X.Org X11 server
- xorg-server-hwe-18.04: X.Org X11 server
- xorg-server-hwe-16.04: X.Org X11 server
Details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
xserver-xorg-core 2:1.20.9-2ubuntu1.3
Ubuntu 20.04 LTS:
xserver-xorg-core 2:1.20.9-2ubuntu1.2~20.04.2
Ubuntu 18.04 LTS:
xserver-xorg-core 2:1.19.6-1ubuntu4.9
xserver-xorg-core-hwe-18.04 2:1.20.8-2ubuntu2.2~18.04.5
Ubuntu 16.04 LTS:
xserver-xorg-core 2:1.18.4-0ubuntu0.12
xserver-xorg-core-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-4905-1
CVE-2021-3472
Package Information:
https://launchpad.net/ubuntu/+source/xorg-server/2:1.20.9-2ubuntu1.3
https://launchpad.net/ubuntu/+source/xorg-server/2:1.20.9-2ubuntu1.2~20.04.2
https://launchpad.net/ubuntu/+source/xorg-server/2:1.19.6-1ubuntu4.9
https://launchpad.net/ubuntu/+source/xorg-server-hwe-18.04/2:1.20.8-2ubuntu2.2~18.04.5
https://launchpad.net/ubuntu/+source/xorg-server/2:1.18.4-0ubuntu0.12
https://launchpad.net/ubuntu/+source/xorg-server-hwe-16.04/2:1.19.6-1ubuntu4.1~16.04.6
--XkVfdrIIouwAmxhZGdR49xukbCySccdvc--
--wPvQQvJ34JCBeFS2lAk5pi3g5ycKUrzyW
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----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=ld1H
-----END PGP SIGNATURE-----
--wPvQQvJ34JCBeFS2lAk5pi3g5ycKUrzyW--
--===============3137730012981569842==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============3137730012981569842==--
|