-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3372-1 [email protected] https://www.debian.org/lts/security/ Thorsten Alteholz March 29, 2023 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : xorg-server Version : 2:1.20.4-1+deb10u9 CVE ID : CVE-2023-1393 Jan-Niklas Sohn discovered that a use-after-free flaw in the Composite extension of the X.org X server may result in privilege escalation if the X server is running under the root user. For Debian 10 buster, this problem has been fixed in version 2:1.20.4-1+deb10u9. We recommend that you upgrade your xorg-server packages. For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmQkTARfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEeYAA//VpzBrW7lC3dB2B0v1aHfRSH3YBRBU8hCipQnjY9iSyAh9J75u6PYvpLR CE0m/3Jjuvk4RLJ/KwglAvY3KVGGbEk7JtlpvDxjlQwZCpriXvRN/o2jgItgeWIM 7yBfF0ucd8oZeMmeZWoKgB4nrrXoj7t5IIJ1e+zLJ/57XMm4XoG3wDm19w9VD4Co ZJYfkyHTm7DgfqKnwAGxAF3jBvcbrQ7E/obuNOn/SswUcLHHWsC/HWncLkqb3Bmi XG2bUz05cr3dj/KSNNs/bObKx3RcEZub0UImaS+8mSBmkVnNXpnpZZHBoaId4cur ckAn/1kvQzO1XMgrtX9qss4WnOe+5zyWRDi2qoV4z22jKMT94mxYjI6gE2u+bAZ6 j4Ar+n4nUZWPM/DnhaYge4yGeC/V+rO8eWQm5ud9LGW7mnwewjgQ93UCsH0ju+1K 6dt44LZ82XNI/dU/9wsbfEcb7NHkwPv/gXXVtcH+Gd+/y7sMEOVeRf4VgvlGEAFU lurqZnx0b8AwcRUR4uFmQX+s/6tXRKE/WFjCy3RnbPD4etsZ14nuVZKXxIvip3Bk gvGxUehzEAFJM5qlPUn+n7KCsLsMg1fNId/pF3WZZfIhJMXQ9hYgzuknttSZ/LNH R9LDJN3mBrvnko92V0fHC9hNLZ02bC1nVzUURpzE/UmGqxKUyfU= =TwD/ -----END PGP SIGNATURE-----
