A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1862246 | Issue Tracking Third Party Advisory |
https://lists.x.org/archives/xorg-announce/2020-August/003058.html | Mailing List Patch Vendor Advisory |
https://security.gentoo.org/glsa/202012-01 | Third Party Advisory |
https://usn.ubuntu.com/4488-2/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2020-09-15 19:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-14346
Mitre link : CVE-2020-14346
CVE.ORG link : CVE-2020-14346
JSON object : View
Products Affected
x.org
- xorg-server
redhat
- enterprise_linux
canonical
- ubuntu_linux
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)