vulnerability
CentOS Linux: CVE-2020-14344: Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update (CESA-2021:1804)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Aug 5, 2020 | Jun 1, 2021 | May 25, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 5, 2020
Added
Jun 1, 2021
Modified
May 25, 2023
Description
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
Solutions
centos-upgrade-drm-utils-debuginfocentos-upgrade-egl-waylandcentos-upgrade-egl-wayland-debuginfocentos-upgrade-egl-wayland-debugsourcecentos-upgrade-libdrmcentos-upgrade-libdrm-debuginfocentos-upgrade-libdrm-debugsourcecentos-upgrade-libdrm-develcentos-upgrade-libglvndcentos-upgrade-libglvnd-core-develcentos-upgrade-libglvnd-debuginfocentos-upgrade-libglvnd-debugsourcecentos-upgrade-libglvnd-develcentos-upgrade-libglvnd-eglcentos-upgrade-libglvnd-egl-debuginfocentos-upgrade-libglvnd-glescentos-upgrade-libglvnd-gles-debuginfocentos-upgrade-libglvnd-glxcentos-upgrade-libglvnd-glx-debuginfocentos-upgrade-libglvnd-openglcentos-upgrade-libglvnd-opengl-debuginfocentos-upgrade-libinputcentos-upgrade-libinput-debuginfocentos-upgrade-libinput-debugsourcecentos-upgrade-libinput-test-debuginfocentos-upgrade-libinput-utilscentos-upgrade-libinput-utils-debuginfocentos-upgrade-libwacomcentos-upgrade-libwacom-datacentos-upgrade-libwacom-debuginfocentos-upgrade-libwacom-debugsourcecentos-upgrade-libx11centos-upgrade-libx11-commoncentos-upgrade-libx11-debuginfocentos-upgrade-libx11-debugsourcecentos-upgrade-libx11-develcentos-upgrade-libx11-xcbcentos-upgrade-libx11-xcb-debuginfocentos-upgrade-mesa-debuginfocentos-upgrade-mesa-debugsourcecentos-upgrade-mesa-dri-driverscentos-upgrade-mesa-dri-drivers-debuginfocentos-upgrade-mesa-filesystemcentos-upgrade-mesa-libeglcentos-upgrade-mesa-libegl-debuginfocentos-upgrade-mesa-libegl-develcentos-upgrade-mesa-libgbmcentos-upgrade-mesa-libgbm-debuginfocentos-upgrade-mesa-libglcentos-upgrade-mesa-libgl-debuginfocentos-upgrade-mesa-libgl-develcentos-upgrade-mesa-libglapicentos-upgrade-mesa-libglapi-debuginfocentos-upgrade-mesa-libosmesacentos-upgrade-mesa-libosmesa-debuginfocentos-upgrade-mesa-libxatrackercentos-upgrade-mesa-libxatracker-debuginfocentos-upgrade-mesa-vdpau-driverscentos-upgrade-mesa-vdpau-drivers-debuginfocentos-upgrade-mesa-vulkan-develcentos-upgrade-mesa-vulkan-driverscentos-upgrade-mesa-vulkan-drivers-debuginfocentos-upgrade-xorg-x11-driverscentos-upgrade-xorg-x11-server-commoncentos-upgrade-xorg-x11-server-debuginfocentos-upgrade-xorg-x11-server-debugsourcecentos-upgrade-xorg-x11-server-xdmxcentos-upgrade-xorg-x11-server-xdmx-debuginfocentos-upgrade-xorg-x11-server-xephyrcentos-upgrade-xorg-x11-server-xephyr-debuginfocentos-upgrade-xorg-x11-server-xnestcentos-upgrade-xorg-x11-server-xnest-debuginfocentos-upgrade-xorg-x11-server-xorgcentos-upgrade-xorg-x11-server-xorg-debuginfocentos-upgrade-xorg-x11-server-xvfbcentos-upgrade-xorg-x11-server-xvfb-debuginfocentos-upgrade-xorg-x11-server-xwaylandcentos-upgrade-xorg-x11-server-xwayland-debuginfo
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.