An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
References
Link | Resource |
---|---|
https://lists.x.org/archives/xorg-announce/2020-August/003056.html | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363 | Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4487-2/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ | Mailing List Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh | Exploit Third Party Advisory |
https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt | Third Party Advisory |
Information
Published : 2020-09-11 11:15
Updated : 2021-11-04 09:10
NVD link : CVE-2020-14363
Mitre link : CVE-2020-14363
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
fedoraproject
- fedora
x.org
- libx11