A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://lists.x.org/archives/xorg-announce/2020-August/003058.html | mailing list patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1862246 | third party advisory issue tracking |
https://usn.ubuntu.com/4488-2/ | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202012-01 | third party advisory vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-1417/ | third party advisory vdb entry |