|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 4328-1 (xorg-server - security update)|
|Summary:||Narendra Shinde discovered that incorrect command-line parameter;validation in the Xorg X server may result in arbitrary file overwrite,;which can result in privilege escalation.|
Narendra Shinde discovered that incorrect command-line parameter
validation in the Xorg X server may result in arbitrary file overwrite,
which can result in privilege escalation.
The Xorg X server is an X server for several architectures and operating
systems, which is derived from the XFree86 4.x series of X servers.
xorg-server on Debian Linux
For the stable distribution (stretch), this problem has been fixed in
We recommend that you upgrade your xorg-server packages.
For the detailed security status of xorg-server please refer to
its security tracker page at:
Common Vulnerability Exposure (CVE) ID: CVE-2018-14665|
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.