First published: Mon Aug 17 2020(Updated: )
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Xorg-server | <1.20.9 | |
Canonical Ubuntu Linux | =14.04 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
X.Org Server | ||
redhat/xorg-x11-server | <1.20.9 | 1.20.9 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u14 2:21.1.7-3+deb12u8 2:21.1.14-2 2:21.1.15-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14362 is a vulnerability that allows local attackers to escalate privileges on affected installations of X.Org Server.
CVE-2020-14362 has a severity rating of 7.8 (High).
To fix CVE-2020-14362, update X.Org Server to version 2:1.19.6-1ubuntu4.5 or apply the appropriate patch from the vendor.
X.Org Server versions 2:1.19.6-1ubuntu4.5 and earlier are affected by CVE-2020-14362.
You can find more information about CVE-2020-14362 on the Red Hat Bugzilla, X.Org Server Announcement, and Ubuntu Security Notices websites.