An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363 | Issue Tracking Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt | Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ | |
https://lists.x.org/archives/xorg-announce/2020-August/003056.html | Vendor Advisory |
https://usn.ubuntu.com/4487-2/ | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-11 18:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-14363
Mitre link : CVE-2020-14363
CVE.ORG link : CVE-2020-14363
JSON object : View
Products Affected
fedoraproject
- fedora
x.org
- libx11