Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2020-14361: Important: xorg-x11-server security update (Multiple Advisories)

Back to Search

Red Hat: CVE-2020-14361: Important: xorg-x11-server security update (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
09/15/2020
Created
11/06/2020
Added
11/05/2020
Modified
05/21/2021

Description

A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Solution(s)

  • redhat-upgrade-drm-utils-debuginfo
  • redhat-upgrade-egl-wayland
  • redhat-upgrade-egl-wayland-debuginfo
  • redhat-upgrade-egl-wayland-debugsource
  • redhat-upgrade-libdrm
  • redhat-upgrade-libdrm-debuginfo
  • redhat-upgrade-libdrm-debugsource
  • redhat-upgrade-libdrm-devel
  • redhat-upgrade-libglvnd
  • redhat-upgrade-libglvnd-core-devel
  • redhat-upgrade-libglvnd-debuginfo
  • redhat-upgrade-libglvnd-debugsource
  • redhat-upgrade-libglvnd-devel
  • redhat-upgrade-libglvnd-egl
  • redhat-upgrade-libglvnd-egl-debuginfo
  • redhat-upgrade-libglvnd-gles
  • redhat-upgrade-libglvnd-gles-debuginfo
  • redhat-upgrade-libglvnd-glx
  • redhat-upgrade-libglvnd-glx-debuginfo
  • redhat-upgrade-libglvnd-opengl
  • redhat-upgrade-libglvnd-opengl-debuginfo
  • redhat-upgrade-libinput
  • redhat-upgrade-libinput-debuginfo
  • redhat-upgrade-libinput-debugsource
  • redhat-upgrade-libinput-test-debuginfo
  • redhat-upgrade-libinput-utils
  • redhat-upgrade-libinput-utils-debuginfo
  • redhat-upgrade-libwacom
  • redhat-upgrade-libwacom-data
  • redhat-upgrade-libwacom-debuginfo
  • redhat-upgrade-libwacom-debugsource
  • redhat-upgrade-libx11
  • redhat-upgrade-libx11-common
  • redhat-upgrade-libx11-debuginfo
  • redhat-upgrade-libx11-debugsource
  • redhat-upgrade-libx11-devel
  • redhat-upgrade-libx11-xcb
  • redhat-upgrade-libx11-xcb-debuginfo
  • redhat-upgrade-mesa-debuginfo
  • redhat-upgrade-mesa-debugsource
  • redhat-upgrade-mesa-dri-drivers
  • redhat-upgrade-mesa-dri-drivers-debuginfo
  • redhat-upgrade-mesa-filesystem
  • redhat-upgrade-mesa-libegl
  • redhat-upgrade-mesa-libegl-debuginfo
  • redhat-upgrade-mesa-libegl-devel
  • redhat-upgrade-mesa-libgbm
  • redhat-upgrade-mesa-libgbm-debuginfo
  • redhat-upgrade-mesa-libgl
  • redhat-upgrade-mesa-libgl-debuginfo
  • redhat-upgrade-mesa-libgl-devel
  • redhat-upgrade-mesa-libglapi
  • redhat-upgrade-mesa-libglapi-debuginfo
  • redhat-upgrade-mesa-libosmesa
  • redhat-upgrade-mesa-libosmesa-debuginfo
  • redhat-upgrade-mesa-libxatracker
  • redhat-upgrade-mesa-libxatracker-debuginfo
  • redhat-upgrade-mesa-vdpau-drivers
  • redhat-upgrade-mesa-vdpau-drivers-debuginfo
  • redhat-upgrade-mesa-vulkan-devel
  • redhat-upgrade-mesa-vulkan-drivers
  • redhat-upgrade-mesa-vulkan-drivers-debuginfo
  • redhat-upgrade-xorg-x11-drivers
  • redhat-upgrade-xorg-x11-server-common
  • redhat-upgrade-xorg-x11-server-debuginfo
  • redhat-upgrade-xorg-x11-server-debugsource
  • redhat-upgrade-xorg-x11-server-devel
  • redhat-upgrade-xorg-x11-server-source
  • redhat-upgrade-xorg-x11-server-xdmx
  • redhat-upgrade-xorg-x11-server-xdmx-debuginfo
  • redhat-upgrade-xorg-x11-server-xephyr
  • redhat-upgrade-xorg-x11-server-xephyr-debuginfo
  • redhat-upgrade-xorg-x11-server-xnest
  • redhat-upgrade-xorg-x11-server-xnest-debuginfo
  • redhat-upgrade-xorg-x11-server-xorg
  • redhat-upgrade-xorg-x11-server-xorg-debuginfo
  • redhat-upgrade-xorg-x11-server-xvfb
  • redhat-upgrade-xorg-x11-server-xvfb-debuginfo
  • redhat-upgrade-xorg-x11-server-xwayland
  • redhat-upgrade-xorg-x11-server-xwayland-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;