An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363 | Issue Tracking Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt | Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ | |
https://lists.x.org/archives/xorg-announce/2020-August/003056.html | Vendor Advisory |
https://usn.ubuntu.com/4487-2/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-09-11 18:15
Updated : 2023-11-07 03:17
NVD link : CVE-2020-14363
Mitre link : CVE-2020-14363
CVE.ORG link : CVE-2020-14363
JSON object : View
Products Affected
x.org
- libx11
fedoraproject
- fedora