USN-5193-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
More Stories
USN-7009-2: Linux kernel vulnerabilities
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could...
php-8.2.24-1.fc39
FEDORA-2024-7c800c4df7 Packages in this update: php-8.2.24-1.fc39 Update description: PHP version 8.2.24 (26 Sep 2024) CGI: Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of...
php-8.3.12-1.fc40
FEDORA-2024-2b429e720e Packages in this update: php-8.3.12-1.fc40 Update description: PHP version 8.3.12 (26 Sep 2024) CGI: Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of...
php-8.3.12-1.fc41
FEDORA-2024-a03b06dbd0 Packages in this update: php-8.3.12-1.fc41 Update description: PHP version 8.3.12 (26 Sep 2024) CGI: Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful...
USN-7033-1: Intel Microcode vulnerabilities
It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface....