First published: Thu Jul 30 2020(Updated: )
A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xorg-x11-server | <1.20.9 | 1.20.9 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u14 2:21.1.7-3+deb12u8 2:21.1.15-2 | |
X.Org xorg-server | <1.20.9 | |
Ubuntu Linux | =14.04 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
X.Org Xserver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14346 is a vulnerability that allows local attackers to escalate privileges on affected installations of X.Org Server.
CVE-2020-14346 has a severity value of 7.8, which is considered high.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2020-14346 affects X.Org Server versions up to and including 1.20.9.
You can find more information about CVE-2020-14346 on the MITRE CVE website, the X.Org Server announcement, and the Red Hat security advisory.