7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
6.1 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:P/I:P/A:C
0.001 Low
EPSS
Percentile
25.3%
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.
The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)
Security Fix(es):
xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345)
xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346)
xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360)
xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361)
xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)
libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363)
xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712)
libX11: Heap overflow in the X input method client (CVE-2020-14344)
xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1826141
bugzilla.redhat.com/show_bug.cgi?id=1854920
bugzilla.redhat.com/show_bug.cgi?id=1856738
bugzilla.redhat.com/show_bug.cgi?id=1862241
bugzilla.redhat.com/show_bug.cgi?id=1862246
bugzilla.redhat.com/show_bug.cgi?id=1862255
bugzilla.redhat.com/show_bug.cgi?id=1862258
bugzilla.redhat.com/show_bug.cgi?id=1863142
bugzilla.redhat.com/show_bug.cgi?id=1869139
bugzilla.redhat.com/show_bug.cgi?id=1869142
bugzilla.redhat.com/show_bug.cgi?id=1869144
bugzilla.redhat.com/show_bug.cgi?id=1872473
bugzilla.redhat.com/show_bug.cgi?id=1878160
bugzilla.redhat.com/show_bug.cgi?id=1886644
bugzilla.redhat.com/show_bug.cgi?id=1886648
bugzilla.redhat.com/show_bug.cgi?id=1887276
bugzilla.redhat.com/show_bug.cgi?id=1887654
bugzilla.redhat.com/show_bug.cgi?id=1887655
bugzilla.redhat.com/show_bug.cgi?id=1891871
bugzilla.redhat.com/show_bug.cgi?id=1896442
bugzilla.redhat.com/show_bug.cgi?id=1897439
bugzilla.redhat.com/show_bug.cgi?id=1914411
errata.rockylinux.org/RLSA-2021:1804
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
6.1 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:P/I:P/A:C
0.001 Low
EPSS
Percentile
25.3%