CVE-2020-14344

EUVD-2020-6488
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
redhatCNA
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
Affected Products (NVD)
VendorProductVersion
x.orglibx11
𝑥
< 1.6.10
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
opensuseleap
15.1
opensuseleap
15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libx11
bookworm
2:1.8.4-2+deb12u2
fixed
bookworm (security)
2:1.8.4-2+deb12u2
fixed
bullseye
2:1.7.2-1+deb11u2
fixed
bullseye (security)
2:1.7.2-1+deb11u2
fixed
sid
2:1.8.10-1
fixed
trixie
2:1.8.7-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libx11
bionic
Fixed 2:1.6.4-3ubuntu0.3
released
focal
Fixed 2:1.6.9-2ubuntu1.1
released
trusty
Fixed 2:1.6.2-1ubuntu2.1+esm1
released
xenial
Fixed 2:1.6.3-1ubuntu2.2
released
References