{"id":"CVE-2020-14344","details":"An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.","modified":"2026-04-09T06:51:41.247339Z","published":"2020-08-05T14:15:12.420Z","related":["ALSA-2021:1804","MGASA-2020-0334","SUSE-SU-2020:14445-1","SUSE-SU-2020:14447-1","SUSE-SU-2020:2116-1","SUSE-SU-2020:2117-1","SUSE-SU-2020:2196-1","SUSE-SU-2020:2197-1","openSUSE-SU-2020:1162-1","openSUSE-SU-2020:1164-1","openSUSE-SU-2020:1182-1","openSUSE-SU-2020:1198-1","openSUSE-SU-2024:10918-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202008-18"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4487-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4487-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html"},{"type":"FIX","url":"https://lists.x.org/archives/xorg-announce/2020-July/003050.html"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2020/07/31/1"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libX11","events":[{"introduced":"0"},{"fixed":"9949364ea761ab7efa2a9930ec7718f966a740c0"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.6.10"}]}}],"versions":["MODULAR_COPY","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_8_1","XORG-6_8_99_10","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-MAIN","libX11-1.1.2","libX11-1.1.3","libX11-1.1.4","libX11-1.1.99.2","libX11-1.2","libX11-1.2.1","libX11-1.2.2","libX11-1.2.99.901","libX11-1.3","libX11-1.3.1","libX11-1.3.2","libX11-1.3.3","libX11-1.3.4","libX11-1.3.99.901","libX11-1.3.99.902","libX11-1.3.99.903","libX11-1.4.0","libX11-1.4.1","libX11-1.4.2","libX11-1.4.3","libX11-1.4.4","libX11-1.4.99.1","libX11-1.4.99.901","libX11-1.4.99.902","libX11-1.5.0","libX11-1.5.99.901","libX11-1.5.99.902","libX11-1.6.0","libX11-1.6.1","libX11-1.6.2","libX11-1.6.3","libX11-1.6.4","libX11-1.6.5","libX11-1.6.6","libX11-1.6.7","libX11-1.6.8","libX11-1.6.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14344.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}