-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4803-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 04, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xorg-server CVE ID : CVE-2020-14360 CVE-2020-25712 Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server performed incomplete input validation, which could result in privilege escalation. For the stable distribution (buster), these problems have been fixed in version 2:1.20.4-1+deb10u2. We recommend that you upgrade your xorg-server packages. For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl/Kez0ACgkQEMKTtsN8 TjY6gQ//RdWyJ65vtkdIrOtdiVIeaVSNtN51krKUuLUXSblfwY3tI0EOwqasd/mu f/XFibzcsvOczUYTA+iXpb5jX+3dg/8vKnNoaEEGzoeIBgaV8J+kAP0VtTT0I9V1 JIRcSCp/ajdDZNNEdCm5Cp0w03oIa9QlUNB5AbZqPVtOP3A4s7k4+GbKDOMMnJmF aOfM73n0rZODibwdyddLdLHshbcbZWI2UG49XDovPUCj9EzgNlIYjyDSEAZFt3YH 5V5uAzwxgk4YvTstnJxSeGWq/SCMI26khrE23AbI2tWqtEEe35NIEbUU7EMzSy9N V7xXpMv0vRdReoP/YUaUfUVBJ3eXS+CRPuZYIWbVa8ZPbLGj29rBZYewWR38/13O QRgCaJWRFP7ACwKrMIwYsuZrS9XLPEUqKjo2vkBmtZT5WwgXiiyRXdaQBbIQoB5Z OzpUmkKMeHCdfHteAltSnYwaz1yjhafYIxq4OJhphxVB6VMgd7UzekxUAYRjb0+s zK32ELpajujL+chxx94gMAjzrlObLNIRzfenzH581EJlLwtMl1JOazQtqz/miEqe keRP11VH8Xli4fNaroA5CyhGKTQer+1Ua5OLTFEtuPao8HHY1XqmeirxvweVcxGN XvNrVYD19giTuksE1Pk5Abj6CH6OlZz9m1LyaoMW+fWxrbVNIrc= =V1Gw -----END PGP SIGNATURE-----