A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1862246 | Issue Tracking Third Party Advisory |
| https://lists.x.org/archives/xorg-announce/2020-August/003058.html | Mailing List Patch Vendor Advisory |
| https://security.gentoo.org/glsa/202012-01 | Third Party Advisory |
| https://usn.ubuntu.com/4488-2/ | Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ | Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=1862246 | Issue Tracking Third Party Advisory |
| https://lists.x.org/archives/xorg-announce/2020-August/003058.html | Mailing List Patch Vendor Advisory |
| https://security.gentoo.org/glsa/202012-01 | Third Party Advisory |
| https://usn.ubuntu.com/4488-2/ | Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
29 Aug 2025, 13:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
X.org x Server
|
|
| CPE | cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* |
21 Nov 2024, 05:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1862246 - Issue Tracking, Third Party Advisory | |
| References | () https://lists.x.org/archives/xorg-announce/2020-August/003058.html - Mailing List, Patch, Vendor Advisory | |
| References | () https://security.gentoo.org/glsa/202012-01 - Third Party Advisory | |
| References | () https://usn.ubuntu.com/4488-2/ - Third Party Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ - Third Party Advisory, VDB Entry |
08 Nov 2022, 20:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* |
04 Nov 2021, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-191 | |
| References | (GENTOO) https://security.gentoo.org/glsa/202012-01 - Third Party Advisory | |
| References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ - Third Party Advisory, VDB Entry |
Information
Published : 2020-09-15 19:15
Updated : 2025-08-29 13:42
NVD link : CVE-2020-14346
Mitre link : CVE-2020-14346
CVE.ORG link : CVE-2020-14346
JSON object : View
Products Affected
redhat
- enterprise_linux
canonical
- ubuntu_linux
x.org
- x_server
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
