漏洞信息详情

X.Org libX11 输入验证错误漏洞

  • CNNVD编号:CNNVD-202007-1897
  • 危害等级: 中危
  • CVE编号: CVE-2020-14344
  • 漏洞类型: 输入验证错误
  • 发布时间: 2020-07-31
  • 威胁类型: 本地
  • 更新时间: 2021-08-12
  • 厂        商:
  • 漏洞来源: Red Hat

漏洞简介

X.Org libX11是X.Org基金会的一个X11(X Window系统)客户端库。

X.Org libX11 1.6.10之前版本中的X Input Method(XIM)客户端存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://gitlab.freedesktop.org/xorg/lib/libx11

参考网址

来源:UBUNTU

链接:https://usn.ubuntu.com/4487-1/

来源:GENTOO

链接:https://security.gentoo.org/glsa/202008-18

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/

来源:UBUNTU

链接:https://usn.ubuntu.com/4487-2/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html

来源:MISC

链接:https://www.openwall.com/lists/oss-security/2020/07/31/1

来源:CONFIRM

链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html

来源:MISC

链接:https://lists.x.org/archives/xorg-announce/2020-July/003050.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html

来源:www.cybersecurity-help.cz

链接:https://www.cybersecurity-help.cz/vdb/SB2021052203

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3019/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/163789/Red-Hat-Security-Advisory-2021-3119-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159048/Ubuntu-Security-Notice-USN-4487-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.1866

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.1711

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.1820

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.2711

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/162655/Red-Hat-Security-Advisory-2021-1804-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2676/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2787/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/162837/Red-Hat-Security-Advisory-2021-2136-01.html

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2020-14344

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158998/Gentoo-Linux-Security-Advisory-202008-18.html

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/libX11-integer-overflow-via-XIM-Client-32989

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2709/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159098/Ubuntu-Security-Notice-USN-4487-2.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3066/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-14344

受影响实体

    暂无


补丁

    暂无

漏洞信息快速查询

相关漏洞

更多