-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4803-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 04, 2020
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xorg-server
CVE ID : CVE-2020-14360 CVE-2020-25712
Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server performed incomplete input validation, which could result in privilege escalation.
For the stable distribution (buster), these problems have been fixed in
version 2:1.20.4-1+deb10u2.
We recommend that you upgrade your xorg-server packages.
For the detailed security status of xorg-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xorg-server
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl/Kez0ACgkQEMKTtsN8 TjY6gQ//RdWyJ65vtkdIrOtdiVIeaVSNtN51krKUuLUXSblfwY3tI0EOwqasd/mu f/XFibzcsvOczUYTA+iXpb5jX+3dg/8vKnNoaEEGzoeIBgaV8J+kAP0VtTT0I9V1 JIRcSCp/ajdDZNNEdCm5Cp0w03oIa9QlUNB5AbZqPVtOP3A4s7k4+GbKDOMMnJmF aOfM73n0rZODibwdyddLdLHshbcbZWI2UG49XDovPUCj9EzgNlIYjyDSEAZFt3YH 5V5uAzwxgk4YvTstnJxSeGWq/SCMI26khrE23AbI2tWqtEEe35NIEbUU7EMzSy9N V7xXpMv0vRdReoP/YUaUfUVBJ3eXS+CRPuZYIWbVa8ZPbLGj29rBZYewWR38/13O QRgCaJWRFP7ACwKrMIwYsuZrS9XLPEUqKjo2vkBmtZT5WwgXiiyRXdaQBbIQoB5Z OzpUmkKMeHCdfHteAltSnYwaz1yjhafYIxq4OJhphxVB6VMgd7UzekxUAYRjb0+s zK32ELpajujL+chxx94gMAjzrlObLNIRzfenzH581EJlLwtMl1JOazQtqz/miEqe keRP11VH8Xli4fNaroA5CyhGKTQer+1Ua5OLTFEtuPao8HHY1XqmeirxvweVcxGN XvNrVYD19giTuksE1Pk5Abj6CH6OlZz9m1LyaoMW+fWxrbVNIrc=
=V1Gw
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)