CVE-2020-14344

Name
CVE-2020-14344
Description
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://lists.x.org/archives/xorg-announce/2020-July/003050.html
Mailing List https://www.openwall.com/lists/oss-security/2020/07/31/1
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
GENTOO https://security.gentoo.org/glsa/202008-18
UBUNTU https://usn.ubuntu.com/4487-1/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
UBUNTU https://usn.ubuntu.com/4487-2/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:* libx11 >= None < 1.6.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status