Improper Initialization Affecting libinput-utils package, versions <0:1.16.3-1.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-LIBINPUTUTILS-2109932
- published 26 Jul 2021
- disclosed 31 Jul 2020
Introduced: 31 Jul 2020
CVE-2020-14347 Open this link in a new tabHow to fix?
Upgrade Centos:8 libinput-utils to version 0:1.16.3-1.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libinput-utils package and not the libinput-utils package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14347
- https://access.redhat.com/security/cve/CVE-2020-14347
- https://www.debian.org/security/2020/dsa-4758
- https://security.gentoo.org/glsa/202012-01
- https://lists.x.org/archives/xorg-announce/2020-July/003051.html
- https://www.openwall.com/lists/oss-security/2020/07/31/2
- https://lists.debian.org/debian-lts-announce/2020/08/msg00057.html
- https://access.redhat.com/errata/RHSA-2021:1804
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html
- https://usn.ubuntu.com/4488-1/
- https://usn.ubuntu.com/4488-2/