USN-6555-2: X.Org X Server vulnerabilities
13 December 2023
Several security issues were fixed in X.Org X Server.
Releases
Packages
- xorg-server - X.Org X11 server
Details
USN-6555-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB
button actions. An attacker could possibly use this issue to cause the X
Server to crash, execute arbitrary code, or escalate privileges.
(CVE-2023-6377)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the RRChangeOutputProperty and
RRChangeProviderProperty APIs. An attacker could possibly use this issue to
cause the X Server to crash, or obtain sensitive information.
(CVE-2023-6478)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
xserver-xorg-core
-
2:1.19.6-1ubuntu4.15+esm3
Available with Ubuntu Pro
-
xwayland
-
2:1.19.6-1ubuntu4.15+esm3
Available with Ubuntu Pro
Ubuntu 16.04
-
xserver-xorg-core
-
2:1.18.4-0ubuntu0.12+esm8
Available with Ubuntu Pro
-
xwayland
-
2:1.18.4-0ubuntu0.12+esm8
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-6555-1: xserver-common, xnest, xorg-server, xwayland, xserver-xorg-dev, xvfb, xserver-xorg-core, xserver-xorg-legacy, xserver-xephyr, xorg-server-source, xdmx, xdmx-tools
- USN-6587-5: xserver-common, xserver-xorg-xmir, xnest, xorg-server, xserver-xorg-dev, xvfb, xserver-xorg-core, xserver-xephyr, xorg-server-source, xdmx, xdmx-tools