Updated libx11 packages fix security vulnerability
Publication date: 18 Aug 2020Modification date: 18 Aug 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-14344
Description
The X Input Method (XIM) client implementation in libX11 has some integer overflows and signed/unsigned comparison issues that can lead to heap corruption when handling malformed messages from an input method (CVE-2020-14344). The libx11 package has been updated to version 1.6.10 which fixes this issue. The x11-proto-devel package has been updated to remove the "/usr/include/X11/extensions/XKBgeom.h" header file which has been moved to the libx11-devel package.
References
- https://bugs.mageia.org/show_bug.cgi?id=27030
- https://lists.x.org/archives/xorg-announce/2019-June/002997.html
- https://lists.x.org/archives/xorg-announce/2019-October/003025.html
- https://lists.x.org/archives/xorg-announce/2020-July/003052.html
- https://lists.x.org/archives/xorg-announce/2020-July/003050.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
SRPMS
7/core
- libx11-1.6.10-1.1.mga7
- x11-proto-devel-2018.4-4.1.mga7