QID 239300
Date Published: 2021-05-20
QID 239300: Red Hat Update for userspace graphics, xorg-x11, and mesa (RHSA-2021:1804)
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es): xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) libX11: Heap overflow in the X input method client (CVE-2020-14344) xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
Affected Products:
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Enterprise Linux for IBM z Systems 8 s390x
Red Hat Enterprise Linux for Power, little endian 8 ppc64le
Red Hat Enterprise Linux for ARM 64 8 aarch64
Red Hat CodeReady Linux Builder for x86_64 8 x86_64
Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
On successful exploitation, it could allow an attacker to execute code.
Refer to Red Hat security advisory RHSA-2021:1804 to address this issue and obtain more information.
- RHSA-2021:1804 -
access.redhat.com/errata/RHSA-2021:1804?language=en
CVEs related to QID 239300
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2021:1804 | Red Hat Enterprise Linux |
|