—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4803-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 04, 2020 https://www.debian.org/security/faq
– ————————————————————————-
Package : xorg-server
CVE ID : CVE-2020-14360 CVE-2020-25712
Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server
performed incomplete input validation, which could result in privilege
escalation.
For the stable distribution (buster), these problems have been fixed in
version 2:1.20.4-1+deb10u2.
We recommend that you upgrade your xorg-server packages.
For the detailed security status of xorg-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xorg-server
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=V1Gw
—–END PGP SIGNATURE—–