Mageia 2020-0334: libx11 security update
Summary
The X Input Method (XIM) client implementation in libX11 has some integer
overflows and signed/unsigned comparison issues that can lead to heap
corruption when handling malformed messages from an input method
(CVE-2020-14344).
The libx11 package has been updated to version 1.6.10 which fixes this issue.
The x11-proto-devel package has been updated to remove the
"/usr/include/X11/extensions/XKBgeom.h" header file which has been moved to
the libx11-devel package.
References
- https://bugs.mageia.org/show_bug.cgi?id=27030
- https://lists.x.org/archives/xorg-announce/2019-June/002997.html
- https://lists.x.org/archives/xorg-announce/2019-October/003025.html
- https://lists.x.org/archives/xorg-announce/2020-July/003052.html
- https://lists.x.org/archives/xorg-announce/2020-July/003050.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
Resolution
MGASA-2020-0334 - Updated libx11 packages fix security vulnerability
SRPMS
- 7/core/libx11-1.6.10-1.1.mga7
- 7/core/x11-proto-devel-2018.4-4.1.mga7