|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 4328-1 (xorg-server - security update)|
|Summary:||Narendra Shinde discovered that incorrect command-line parameter;validation in the Xorg X server may result in arbitrary file overwrite,;which can result in privilege escalation.|
Narendra Shinde discovered that incorrect command-line parameter
validation in the Xorg X server may result in arbitrary file overwrite,
which can result in privilege escalation.
xorg-server on Debian Linux
For the stable distribution (stretch), this problem has been fixed in
We recommend that you upgrade your xorg-server packages.
For the detailed security status of xorg-server please refer to
its security tracker page linked in the references.
Common Vulnerability Exposure (CVE) ID: CVE-2018-14665|
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.