{
  "document": {
    "aggregate_severity": {
      "text": "High"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos8.4els/vex/2020/cve-2020-14382-els_os-centos8_4els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-10T19:34:42Z",
      "generator": {
        "date": "2026-04-10T19:34:42Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2020-14382-ELS_OS-CENTOS8.4ELS",
      "initial_release_date": "2020-09-16T15:15:00Z",
      "revision_history": [
        {
          "date": "2020-09-16T15:15:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-10T19:34:42Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Security update on CVE-2020-14382"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8.4",
                "product": {
                  "name": "Community Enterprise Operating System 8.4",
                  "product_id": "CentOS-8.4",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8.4:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
                "product": {
                  "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
                  "product_id": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/cryptsetup-devel@2.3.3-4.el8.tuxcare.els1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64",
                "product": {
                  "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64",
                  "product_id": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/cryptsetup-devel@2.3.3-4.el8.tuxcare.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686"
        },
        "product_reference": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64"
        },
        "product_reference": "cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-14382",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2_json_metadata.c' in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement \"intervals = malloc(first_backup * sizeof(*intervals));\"). Due to the bug, library can be *tricked* to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "under_investigation": [
          "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
          "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-14382"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1874712",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874712"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJTQ4KSVCW2NMSU5WFVPOHY46WMNF4OB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJTQ4KSVCW2NMSU5WFVPOHY46WMNF4OB/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD6YSD63LLRRC4WQ7DJLSXWNUCY6FWBM/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD6YSD63LLRRC4WQ7DJLSXWNUCY6FWBM/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4493-1/",
          "url": "https://usn.ubuntu.com/4493-1/"
        }
      ],
      "release_date": "2020-09-16T15:15:00Z",
      "remediations": [
        {
          "category": "none_available",
          "details": "Affected",
          "product_ids": [
            "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
            "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.i686",
            "CentOS-8.4:cryptsetup-devel-0:2.3.3-4.el8.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}