Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2020-14347: Important: xorg-x11-server security update (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

CentOS Linux: CVE-2020-14347: Important: xorg-x11-server security update (Multiple Advisories)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
08/05/2020
Created
12/16/2020
Added
12/15/2020
Modified
05/25/2023

Description

A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.

Solution(s)

  • centos-upgrade-drm-utils-debuginfo
  • centos-upgrade-egl-wayland
  • centos-upgrade-egl-wayland-debuginfo
  • centos-upgrade-egl-wayland-debugsource
  • centos-upgrade-libdrm
  • centos-upgrade-libdrm-debuginfo
  • centos-upgrade-libdrm-debugsource
  • centos-upgrade-libdrm-devel
  • centos-upgrade-libglvnd
  • centos-upgrade-libglvnd-core-devel
  • centos-upgrade-libglvnd-debuginfo
  • centos-upgrade-libglvnd-debugsource
  • centos-upgrade-libglvnd-devel
  • centos-upgrade-libglvnd-egl
  • centos-upgrade-libglvnd-egl-debuginfo
  • centos-upgrade-libglvnd-gles
  • centos-upgrade-libglvnd-gles-debuginfo
  • centos-upgrade-libglvnd-glx
  • centos-upgrade-libglvnd-glx-debuginfo
  • centos-upgrade-libglvnd-opengl
  • centos-upgrade-libglvnd-opengl-debuginfo
  • centos-upgrade-libinput
  • centos-upgrade-libinput-debuginfo
  • centos-upgrade-libinput-debugsource
  • centos-upgrade-libinput-test-debuginfo
  • centos-upgrade-libinput-utils
  • centos-upgrade-libinput-utils-debuginfo
  • centos-upgrade-libwacom
  • centos-upgrade-libwacom-data
  • centos-upgrade-libwacom-debuginfo
  • centos-upgrade-libwacom-debugsource
  • centos-upgrade-libx11
  • centos-upgrade-libx11-common
  • centos-upgrade-libx11-debuginfo
  • centos-upgrade-libx11-debugsource
  • centos-upgrade-libx11-devel
  • centos-upgrade-libx11-xcb
  • centos-upgrade-libx11-xcb-debuginfo
  • centos-upgrade-mesa-debuginfo
  • centos-upgrade-mesa-debugsource
  • centos-upgrade-mesa-dri-drivers
  • centos-upgrade-mesa-dri-drivers-debuginfo
  • centos-upgrade-mesa-filesystem
  • centos-upgrade-mesa-libegl
  • centos-upgrade-mesa-libegl-debuginfo
  • centos-upgrade-mesa-libegl-devel
  • centos-upgrade-mesa-libgbm
  • centos-upgrade-mesa-libgbm-debuginfo
  • centos-upgrade-mesa-libgl
  • centos-upgrade-mesa-libgl-debuginfo
  • centos-upgrade-mesa-libgl-devel
  • centos-upgrade-mesa-libglapi
  • centos-upgrade-mesa-libglapi-debuginfo
  • centos-upgrade-mesa-libosmesa
  • centos-upgrade-mesa-libosmesa-debuginfo
  • centos-upgrade-mesa-libxatracker
  • centos-upgrade-mesa-libxatracker-debuginfo
  • centos-upgrade-mesa-vdpau-drivers
  • centos-upgrade-mesa-vdpau-drivers-debuginfo
  • centos-upgrade-mesa-vulkan-devel
  • centos-upgrade-mesa-vulkan-drivers
  • centos-upgrade-mesa-vulkan-drivers-debuginfo
  • centos-upgrade-xorg-x11-drivers
  • centos-upgrade-xorg-x11-server-common
  • centos-upgrade-xorg-x11-server-debuginfo
  • centos-upgrade-xorg-x11-server-debugsource
  • centos-upgrade-xorg-x11-server-devel
  • centos-upgrade-xorg-x11-server-source
  • centos-upgrade-xorg-x11-server-xdmx
  • centos-upgrade-xorg-x11-server-xdmx-debuginfo
  • centos-upgrade-xorg-x11-server-xephyr
  • centos-upgrade-xorg-x11-server-xephyr-debuginfo
  • centos-upgrade-xorg-x11-server-xnest
  • centos-upgrade-xorg-x11-server-xnest-debuginfo
  • centos-upgrade-xorg-x11-server-xorg
  • centos-upgrade-xorg-x11-server-xorg-debuginfo
  • centos-upgrade-xorg-x11-server-xvfb
  • centos-upgrade-xorg-x11-server-xvfb-debuginfo
  • centos-upgrade-xorg-x11-server-xwayland
  • centos-upgrade-xorg-x11-server-xwayland-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;