Unrated severityNVD Advisory· Published Aug 5, 2020· Updated Aug 4, 2024
CVE-2020-14347
CVE-2020-14347
Description
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
Affected products
48- osv-coords47 versionspkg:rpm/almalinux/libglvndpkg:rpm/almalinux/libglvnd-core-develpkg:rpm/almalinux/libglvnd-develpkg:rpm/almalinux/libglvnd-eglpkg:rpm/almalinux/libglvnd-glespkg:rpm/almalinux/libglvnd-glxpkg:rpm/almalinux/libglvnd-openglpkg:rpm/almalinux/libinput-develpkg:rpm/almalinux/libwacom-develpkg:rpm/almalinux/mesa-libgbm-develpkg:rpm/almalinux/mesa-libOSMesa-develpkg:rpm/almalinux/xorg-x11-driverspkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xorg-x11-server&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 1:1.3.2-1.el8+ 46 more
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1:1.3.2-1.el8
- (no CPE)range: < 1.16.3-1.el8
- (no CPE)range: < 1.6-2.el8
- (no CPE)range: < 20.3.3-2.el8
- (no CPE)range: < 20.3.3-2.el8
- (no CPE)range: < 7.7-30.el8
- (no CPE)range: < 1.20.10-1.el8
- (no CPE)range: < 1.20.10-1.el8
- (no CPE)range: < 1.20.3-lp151.4.3.1
- (no CPE)range: < 1.20.3-lp152.8.3.1
- (no CPE)range: < 1.20.13-1.2
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 1.19.6-8.16.1
- (no CPE)range: < 1.19.6-8.16.1
- (no CPE)range: < 1.20.3-14.5.1
- (no CPE)range: < 1.20.3-22.5.1
- (no CPE)range: < 1.20.3-14.5.1
- (no CPE)range: < 1.20.3-22.5.1
- (no CPE)range: < 7.4-27.122.26.1
- (no CPE)range: < 7.4-27.122.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 1.19.6-4.8.1
- (no CPE)range: < 1.19.6-10.8.1
- (no CPE)range: < 1.19.6-8.16.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 1.19.6-4.8.1
- (no CPE)range: < 1.19.6-10.8.1
- (no CPE)range: < 1.19.6-8.16.1
- (no CPE)range: < 1.19.6-10.8.1
- (no CPE)range: < 1.20.3-14.5.1
- (no CPE)range: < 1.20.3-22.5.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 1.19.6-4.8.1
- (no CPE)range: < 7.6_1.18.3-76.26.1
- (no CPE)range: < 1.19.6-4.8.1
- The Xorg Project/xorg-x11-serverv5Range: 1.20.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.htmlmitrevendor-advisoryx_refsource_SUSE
- security.gentoo.org/glsa/202012-01mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/4488-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4488-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2020/dsa-4758mitrevendor-advisoryx_refsource_DEBIAN
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2020/08/msg00057.htmlmitremailing-listx_refsource_MLIST
- lists.x.org/archives/xorg-announce/2020-July/003051.htmlmitrex_refsource_MISC
- www.openwall.com/lists/oss-security/2020/07/31/2mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.