CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
CVE-2020-14347 - Failure to initialize memory when allocating buffers for pixmaps using the AllocatePixmap() call could cause the X client to leak memory contents from the heap when the X server is running with elevated privileges. CVE-2020-14344 is an integer overflow in the XIM (Input Method) implementation of libX11 that can cause corruption of memory regions in the heap when processing specially-formatted messages from the input method.Identifier of the Information Security Threat Data Bank of the FSTEC of Russia: BDU:2020-03916, BDU:2020-03915
Install security updates for the following packages: libX11* and xorg-x11The updates can be installed in the following ways:**a) if the computer with the installed OS version has access to the vendor’s official repository, run the update as administrator with the command:# yum update
After the list of updated packages is displayed, agree to apply the updates by pressingYon the keyboard. Wait until the updates installation is complete and make sure that there are no errors during their installation.b)If the computer with the installed OS version does not have access to the vendor’s official repository, you should perform the following actions: - download the updated package (and dependencies if necessary): http://repo.red-soft.ru/redos/7.2c/x86_64/updates/ Check the package integrity and authenticity by instructionsInstall the downloaded package with the command:`# yum localinstall libX11 xorg-x11``When the list of updated packages is displayed, agree to apply the updates by pressingY* on the keyboard. Wait for the updates to finish installing and make sure there are no errors during installation.
Date of last modification: 08.09.2021
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High