{"id":"UBUNTU-CVE-2021-4010","details":"A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","modified":"2026-02-04T02:37:36.973022Z","published":"2021-12-14T12:00:00Z","related":["USN-5193-1"],"upstream":["CVE-2021-4010"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4010"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2021/12/14/1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5193-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-4010"}],"affected":[{"package":{"name":"xorg-server-hwe-18.04","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.20.8-2ubuntu2.2~18.04.6"}]}],"versions":["2:1.20.1-3ubuntu2.1~18.04.1","2:1.20.4-1ubuntu3~18.04.1","2:1.20.5+git20191008-0ubuntu1~18.04.1","2:1.20.8-2ubuntu2.1~18.04.1","2:1.20.8-2ubuntu2.2~18.04.1","2:1.20.8-2ubuntu2.2~18.04.2","2:1.20.8-2ubuntu2.2~18.04.3","2:1.20.8-2ubuntu2.2~18.04.4","2:1.20.8-2ubuntu2.2~18.04.5"],"ecosystem_specific":{"binaries":[{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xorg-server-source-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xserver-xephyr-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xserver-xorg-core-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xserver-xorg-dev-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xserver-xorg-legacy-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.6","binary_name":"xwayland-hwe-18.04"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-4010.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.20.13-1ubuntu1~20.04.2"}]}],"versions":["2:1.20.5+git20191008-0ubuntu1","2:1.20.6-1ubuntu1","2:1.20.7-2ubuntu1","2:1.20.7-2ubuntu2","2:1.20.8-2ubuntu2","2:1.20.8-2ubuntu2.1","2:1.20.8-2ubuntu2.2","2:1.20.8-2ubuntu2.3","2:1.20.8-2ubuntu2.4","2:1.20.8-2ubuntu2.6","2:1.20.9-2ubuntu1.1~20.04.1","2:1.20.9-2ubuntu1.2~20.04.1","2:1.20.9-2ubuntu1.2~20.04.2","2:1.20.11-1ubuntu1~20.04.2"],"ecosystem_specific":{"binaries":[{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xdmx"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xdmx-tools"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xnest"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xorg-server-source"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xserver-common"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xserver-xephyr"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xvfb"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.2","binary_name":"xwayland"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-4010.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.20.13-1ubuntu2"}]}],"versions":["2:1.20.13-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xdmx"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xdmx-tools"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xnest"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xorg-server-source"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xserver-common"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xserver-xephyr"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:1.20.13-1ubuntu2","binary_name":"xvfb"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-4010.json"}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xwayland@2:21.1.3-1ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:21.1.3-1ubuntu1"}]}],"versions":["2:21.1.2-0ubuntu1","2:21.1.3-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2:21.1.3-1ubuntu1","binary_name":"xwayland"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-4010.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}