Show plain JSON{"acknowledgement": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.", "affected_release": [{"advisory": "RHSA-2020:5408", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "xorg-x11-server-0:1.20.4-15.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2020-12-14T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "egl-wayland-0:1.1.5-3.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "libdrm-0:2.4.103-1.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "libglvnd-1:1.3.2-1.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "libinput-0:1.16.3-1.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "libwacom-0:1.6-2.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "libX11-0:1.6.8-4.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "mesa-0:20.3.3-2.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "xorg-x11-drivers-0:7.7-30.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}, {"advisory": "RHSA-2021:1804", "cpe": "cpe:/a:redhat:enterprise_linux:8", "impact": "moderate", "package": "xorg-x11-server-0:1.20.10-1.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-05-18T00:00:00Z"}], "bugzilla": {"description": "xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability", "id": "1887276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887276"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.8", "cvss3_scoring_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-122", "details": ["A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "A flaw was found in xorg-x11-server. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."], "name": "CVE-2020-25712", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Out of support scope", "package_name": "xorg-x11-server", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "xorg-x11-server", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2020-12-01T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2020-25712\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-25712\nhttps://lists.x.org/archives/xorg-announce/2020-December/003066.html"], "statement": "The Xorg server in Red Hat Enterprise Linux 8 does not run with root privileges, thus this flaw has been rated as having a moderate impact on that platform.", "threat_severity": "Important"}