A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
References
Configurations
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc - Patch, Third Party Advisory | |
References | () https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938 - Patch, Third Party Advisory | |
References | () https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939 - Patch, Third Party Advisory | |
References | () https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html - Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202210-30 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221104-0003/ - Third Party Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-22-963/ - Third Party Advisory, VDB Entry |
03 Dec 2022, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) https://security.gentoo.org/glsa/202210-30 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20221104-0003/ - Third Party Advisory |
04 Nov 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Sep 2022, 19:54
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938 - Patch, Third Party Advisory | |
References | (MISC) https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc - Patch, Third Party Advisory | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:x.org:xorg-server:21.1.0:*:*:*:*:*:*:* |
02 Sep 2022, 12:56
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-01 21:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2320
Mitre link : CVE-2022-2320
CVE.ORG link : CVE-2022-2320
JSON object : View
Products Affected
x.org
- xorg-server
CWE
CWE-787
Out-of-bounds Write