6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
19.1%
An integer overflow leading to a heap-buffer overflow was found in The X
Input Method (XIM) client was implemented in libX11 before version 1.6.10.
As per upstream this is security relevant when setuid programs call XIM
client functions while running with elevated privileges. No such programs
are shipped with Red Hat Enterprise Linux.
Author | Note |
---|---|
seth-arnold | Debian triage notes the original fixes introduced regression |
mdeslaur | a second regression was reported in bug 117 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libx11 | < 2:1.6.4-3ubuntu0.3 | UNKNOWN |
ubuntu | 20.04 | noarch | libx11 | < 2:1.6.9-2ubuntu1.1 | UNKNOWN |
ubuntu | 14.04 | noarch | libx11 | < 2:1.6.2-1ubuntu2.1+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | libx11 | < 2:1.6.3-1ubuntu2.2 | UNKNOWN |
6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
19.1%