Lucene search

K
mageiaGentoo FoundationMGASA-2020-0334
HistoryAug 18, 2020 - 9:47 p.m.

Updated libx11 packages fix security vulnerability

2020-08-1821:47:25
Gentoo Foundation
advisories.mageia.org
23

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.2%

The X Input Method (XIM) client implementation in libX11 has some integer overflows and signed/unsigned comparison issues that can lead to heap corruption when handling malformed messages from an input method (CVE-2020-14344). The libx11 package has been updated to version 1.6.10 which fixes this issue. The x11-proto-devel package has been updated to remove the “/usr/include/X11/extensions/XKBgeom.h” header file which has been moved to the libx11-devel package.

OSVersionArchitecturePackageVersionFilename
Mageia7noarchlibx11< 1.6.10-1.1libx11-1.6.10-1.1.mga7
Mageia7noarchx11-proto-devel< 2018.4-4.1x11-proto-devel-2018.4-4.1.mga7

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.2%