vulnerability

CentOS Linux: CVE-2020-14344: Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update (CESA-2021:1804)

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 5, 2020
Added
Jun 1, 2021
Modified
May 25, 2023

Description

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.

Solutions

centos-upgrade-drm-utils-debuginfocentos-upgrade-egl-waylandcentos-upgrade-egl-wayland-debuginfocentos-upgrade-egl-wayland-debugsourcecentos-upgrade-libdrmcentos-upgrade-libdrm-debuginfocentos-upgrade-libdrm-debugsourcecentos-upgrade-libdrm-develcentos-upgrade-libglvndcentos-upgrade-libglvnd-core-develcentos-upgrade-libglvnd-debuginfocentos-upgrade-libglvnd-debugsourcecentos-upgrade-libglvnd-develcentos-upgrade-libglvnd-eglcentos-upgrade-libglvnd-egl-debuginfocentos-upgrade-libglvnd-glescentos-upgrade-libglvnd-gles-debuginfocentos-upgrade-libglvnd-glxcentos-upgrade-libglvnd-glx-debuginfocentos-upgrade-libglvnd-openglcentos-upgrade-libglvnd-opengl-debuginfocentos-upgrade-libinputcentos-upgrade-libinput-debuginfocentos-upgrade-libinput-debugsourcecentos-upgrade-libinput-test-debuginfocentos-upgrade-libinput-utilscentos-upgrade-libinput-utils-debuginfocentos-upgrade-libwacomcentos-upgrade-libwacom-datacentos-upgrade-libwacom-debuginfocentos-upgrade-libwacom-debugsourcecentos-upgrade-libx11centos-upgrade-libx11-commoncentos-upgrade-libx11-debuginfocentos-upgrade-libx11-debugsourcecentos-upgrade-libx11-develcentos-upgrade-libx11-xcbcentos-upgrade-libx11-xcb-debuginfocentos-upgrade-mesa-debuginfocentos-upgrade-mesa-debugsourcecentos-upgrade-mesa-dri-driverscentos-upgrade-mesa-dri-drivers-debuginfocentos-upgrade-mesa-filesystemcentos-upgrade-mesa-libeglcentos-upgrade-mesa-libegl-debuginfocentos-upgrade-mesa-libegl-develcentos-upgrade-mesa-libgbmcentos-upgrade-mesa-libgbm-debuginfocentos-upgrade-mesa-libglcentos-upgrade-mesa-libgl-debuginfocentos-upgrade-mesa-libgl-develcentos-upgrade-mesa-libglapicentos-upgrade-mesa-libglapi-debuginfocentos-upgrade-mesa-libosmesacentos-upgrade-mesa-libosmesa-debuginfocentos-upgrade-mesa-libxatrackercentos-upgrade-mesa-libxatracker-debuginfocentos-upgrade-mesa-vdpau-driverscentos-upgrade-mesa-vdpau-drivers-debuginfocentos-upgrade-mesa-vulkan-develcentos-upgrade-mesa-vulkan-driverscentos-upgrade-mesa-vulkan-drivers-debuginfocentos-upgrade-xorg-x11-driverscentos-upgrade-xorg-x11-server-commoncentos-upgrade-xorg-x11-server-debuginfocentos-upgrade-xorg-x11-server-debugsourcecentos-upgrade-xorg-x11-server-xdmxcentos-upgrade-xorg-x11-server-xdmx-debuginfocentos-upgrade-xorg-x11-server-xephyrcentos-upgrade-xorg-x11-server-xephyr-debuginfocentos-upgrade-xorg-x11-server-xnestcentos-upgrade-xorg-x11-server-xnest-debuginfocentos-upgrade-xorg-x11-server-xorgcentos-upgrade-xorg-x11-server-xorg-debuginfocentos-upgrade-xorg-x11-server-xvfbcentos-upgrade-xorg-x11-server-xvfb-debuginfocentos-upgrade-xorg-x11-server-xwaylandcentos-upgrade-xorg-x11-server-xwayland-debuginfo
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.