X.Org libX11是X.Org基金会的一个X11(X Window系统)客户端库。
X.Org libX11 1.6.10之前版本中的X Input Method(XIM)客户端存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://gitlab.freedesktop.org/xorg/lib/libx11
来源:UBUNTU
链接:https://usn.ubuntu.com/4487-1/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202008-18
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
来源:UBUNTU
链接:https://usn.ubuntu.com/4487-2/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
来源:MISC
链接:https://www.openwall.com/lists/oss-security/2020/07/31/1
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
来源:MISC
链接:https://lists.x.org/archives/xorg-announce/2020-July/003050.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052203
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3019/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163789/Red-Hat-Security-Advisory-2021-3119-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159048/Ubuntu-Security-Notice-USN-4487-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1866
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1711
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1820
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2711
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162655/Red-Hat-Security-Advisory-2021-1804-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2676/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2787/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162837/Red-Hat-Security-Advisory-2021-2136-01.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-14344
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158998/Gentoo-Linux-Security-Advisory-202008-18.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/libX11-integer-overflow-via-XIM-Client-32989
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2709/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159098/Ubuntu-Security-Notice-USN-4487-2.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3066/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-14344
暂无