rpm package
suse/libxcb&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3
pkg:rpm/suse/libxcb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-14344 | — | < 1.10-4.5.1 | 1.10-4.5.1 | Aug 5, 2020 | An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No | ||
| CVE-2018-14600 | — | < 1.10-4.3.1 | 1.10-4.3.1 | Aug 24, 2018 | An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution. | ||
| CVE-2018-14599 | — | < 1.10-4.3.1 | 1.10-4.3.1 | Aug 24, 2018 | An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact. | ||
| CVE-2018-14598 | — | < 1.10-4.3.1 | 1.10-4.3.1 | Aug 24, 2018 | An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault). |
- CVE-2020-14344Aug 5, 2020affected < 1.10-4.5.1fixed 1.10-4.5.1
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No
- CVE-2018-14600Aug 24, 2018affected < 1.10-4.3.1fixed 1.10-4.3.1
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
- CVE-2018-14599Aug 24, 2018affected < 1.10-4.3.1fixed 1.10-4.3.1
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
- CVE-2018-14598Aug 24, 2018affected < 1.10-4.3.1fixed 1.10-4.3.1
An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).