libX11 is vulnerable to arbitrary code execution. An integer overflow leading to a heap-buffer overflow in the X Input Method (XIM) client allows an attacker to execute arbitrary code with elevated privileges.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
lists.fedoraproject.org/archives/list/[email protected]/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
lists.fedoraproject.org/archives/list/[email protected]/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
lists.fedoraproject.org/archives/list/[email protected]/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
lists.x.org/archives/xorg-announce/2020-July/003050.html
security.gentoo.org/glsa/202008-18
usn.ubuntu.com/4487-1/
usn.ubuntu.com/4487-2/
www.openwall.com/lists/oss-security/2020/07/31/1