xorg-x11-server-1.20.4-15.el7
エラータID: AXSA:2020-988:02
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2020-14347
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
CVE-2020-14360
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25712
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Update packages.
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
N/A
SRPMS
- xorg-x11-server-1.20.4-15.el7.src.rpm
MD5: b4c7ff033b40807719c37865d36abed7
SHA-256: b199b2f628bb59ab01e74517c1f220bdaa4501c9be7c39709f5fa3d4abafee1b
Size: 5.93 MB
Asianux Server 7 for x86_64
- xorg-x11-server-common-1.20.4-15.el7.x86_64.rpm
MD5: d96707707991edd3885776ab663e1405
SHA-256: 9a695b43f62db91bd147ef786b0409c5aa9e836aaab7ed76b6f15af3d2049bfe
Size: 54.82 kB - xorg-x11-server-Xephyr-1.20.4-15.el7.x86_64.rpm
MD5: 84072b1cc715e51d76b5d2888d41e081
SHA-256: 4386db4103ae4937efe2045efff3310891ecbe7f32dcee65ec3330e6d61e1390
Size: 0.98 MB - xorg-x11-server-Xorg-1.20.4-15.el7.x86_64.rpm
MD5: 60a2e7a00498a4b5f82d225130b29608
SHA-256: 821c2bc0191bd8e9c18c53ba40dc99818663f9ab37d78761ae6e9bbe0dbf7194
Size: 1.45 MB - xorg-x11-server-Xwayland-1.20.4-15.el7.x86_64.rpm
MD5: 61ea5b4115d52f6add1c539fa5968e17
SHA-256: e1355ca4dd7d335b002308448aad7bd4dce8eef410d0712e2d73a8aa173a4814
Size: 949.76 kB