Bug 1869144 (CVE-2020-14362) - CVE-2020-14362 xorg-x11-server: XRecordRegisterClients Integer Underflow Privilege Escalation Vulnerability
Summary: CVE-2020-14362 xorg-x11-server: XRecordRegisterClients Integer Underflow Priv...
Keywords:
Status: NEW
Alias: CVE-2020-14362
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1872406 1872407 1872408 1872409 1872410
Blocks: 1862265
TreeView+ depends on / blocked
 
Reported: 2020-08-17 04:49 UTC by Huzaifa S. Sidhpurwala
Modified: 2020-09-09 16:08 UTC (History)
12 users (show)

Fixed In Version: xorg-x11-server 1.20.9
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in X.Org Server. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Huzaifa S. Sidhpurwala 2020-08-17 04:49:20 UTC
A flaw was found in X.Org Server. An Integer underflow leading to heap-buffer overflow was found in XRecordRegisterClients may lead to a privilege escalation vulnerability.

Comment 1 Huzaifa S. Sidhpurwala 2020-08-17 04:49:24 UTC
Acknowledgments:

Name: Jan-Niklas Sohn (Trend Micro Zero Day Initiative)

Comment 4 Huzaifa S. Sidhpurwala 2020-08-25 16:15:11 UTC
External References:

https://lists.x.org/archives/xorg-announce/2020-August/003058.html

Comment 5 Huzaifa S. Sidhpurwala 2020-08-25 16:19:10 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-all [bug 1872410]

Comment 7 Huzaifa S. Sidhpurwala 2020-08-26 08:57:15 UTC
Statement:

Xorg server does not run with root  privileges in Red Hat Enterprise Linux 8, therefore this flaw has been rated as having moderate impact for Red Hat Enterprise linux 8.


Note You need to log in before you can comment on or make changes to this bug.