First published: Mon Aug 17 2020(Updated: )
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Xorg-server | <1.20.9 | |
Canonical Ubuntu Linux | =14.04 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
X.Org Server | ||
redhat/xorg-x11-server | <1.20.9 | 1.20.9 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u14 2:21.1.7-3+deb12u8 2:21.1.14-2 2:21.1.15-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14361 is a vulnerability in X.Org Server that allows local attackers to escalate privileges on affected installations.
CVE-2020-14361 has a severity level of 7.8 (High).
To exploit CVE-2020-14361, an attacker must first obtain the ability to execute low-privileged code on the target system.
Yes, updating X.Org Server to version 1.20.9 or higher is recommended to fix CVE-2020-14361.
You can find more information about CVE-2020-14361 on the MITRE CVE website, X.Org Server mailing list, and Red Hat Security website.