Heap-based Buffer Overflow Affecting libinput-utils package, versions <0:1.16.3-1.el8
Threat Intelligence
EPSS
0.06% (28th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-LIBINPUTUTILS-2109611
- published 26 Jul 2021
- disclosed 1 Dec 2020
Introduced: 1 Dec 2020
CVE-2020-25712 Open this link in a new tabHow to fix?
Upgrade Centos:8 libinput-utils to version 0:1.16.3-1.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libinput-utils package and not the libinput-utils package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Scores
version 3.1