Path: ...!feeds.phibee-telecom.net!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!bofh.it!news.nic.it!robomod From: Salvatore Bonaccorso Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5342-1] xorg-server security update Date: Tue, 07 Feb 2023 16:50:01 +0100 Message-ID: X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Tue Feb 7 15:48:51 2023 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.491 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=29wEHjgTKLHLRPxEmTpWsfQh3UaahZFoMRnsSLIwspk=; b=QC 51KZUxCYtjd2ERuV0Sf8690nh2P+JlaQeTp7VWWgkscIvz2+Fr8CFO8+D0tyCCilTKhif10WaLKA2 6z/+qQ3josmDNVDqzmtZYpx15164DRg0SXtCwTSS6DHA23trRQ6LFg9UliLp0+ELfYbqFTd+UtQTu HPpu2kT4xS7hMIXjGBNPLau9q69EGKlkA2/jblAyH5W3Do1XYyvzmWRlmCJYskf4b0156nIJYUATG C5RB3SxA2cML7lwO2KzI/1JJv+9QfTTnWXj+PJ5uwdJbtUdVPmA2UYWIAVeMBcSDbqeEf93T6wV8u a5Iif9/QFns8DXk662AHFlhTurquqByA==; X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4242 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/E1pPQCo-00A5KE-Er@seger.debian.org Approved: robomod@news.nic.it Lines: 49 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Tue, 07 Feb 2023 15:48:26 +0000 X-Original-Message-ID: Bytes: 4518 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5342-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 07, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xorg-server CVE ID : CVE-2023-0494 Debian Bug : 1030777 Jan-Niklas Sohn discovered that a user-after-free flaw in the X Input extension of the X.org X server may result in privilege escalation if the X server is running under the root user. For the stable distribution (bullseye), this problem has been fixed in version 2:1.20.11-1+deb11u5. We recommend that you upgrade your xorg-server packages. For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmPicbFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SRXA//TkvSUmnXOeLnm87wIR/c958zkHr5WlhTYddfI58Xv1JtLY+ejx6uPDwV jEhYrLFR0FTTFMFtlUAC3LjciL5uF0uQqonbj3ur5nyb3zVLXba40NhiIzAcRkfN jKFuoMFrYZaGQT266aEfhMlzUGsfuI7aZ48lX7QNCFfq5on14vqiUbrwQw/YlebO bqfMjof99+GVgx85uNEdNMsDT6cBfhvYBIFG5IRodjEPoCPjF7q04r01kphMEpCg 0hKc0g5XVwTvD3GbrhuF/dANVOPcIkgIQD+0bV/jNBbqsneIUDz4y8JMJ29oP4NN AjnYxG+TjcZPsOxeH1pPKI3v8LvQlQVXJR9FR+MzbsczFuCBPvvfBhySQJbNnzFo S3Dnwm9JzD6mjNqlWklCeOG0XUjSDA1MVN+278lTZ7Az9ts9HIcjaHGx0dId9vHP KJuDv+UT7LQZDkogmpokrhaSOt14QRRIC53kHlAq35TDBwHrbhmgtpqdonvLWnCk Nt5GkN9Dk74bF9w7baZt4ZsEFcJl5TdFavzFCbdTOiFB9kDe4jsDKghVEkLw93JP sY7vcehveCUEm48aN0gSYZY5tJ/HXBE9AmOI3q+bzfr1VmdwMWY+Ew29hsaIn8ZS EI78ommssqCr1V3fch+2dcRjzBAtQ25aABfyaNbpSxYjzZTKSOU= =ygLt -----END PGP SIGNATURE-----