A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-4283 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2151761 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202305-30 | |
https://www.debian.org/security/2022/dsa-5304 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
30 May 2023, 06:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2023, 23:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5304 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory |
12 Feb 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. | |
References |
|
02 Feb 2023, 16:19
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in X.Org. This issue occurs because the XkbCopyNames function leaves a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. | |
References |
|
27 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Dec 2022, 14:51
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-4283 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2151761 - Issue Tracking, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory | |
First Time |
Fedoraproject
Redhat enterprise Linux X.org xorg-server Redhat X.org Fedoraproject fedora |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
CPE | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:xorg-server:1.20.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
19 Dec 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Dec 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-4283
Mitre link : CVE-2022-4283
CVE.ORG link : CVE-2022-4283
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
redhat
- enterprise_linux
x.org
- xorg-server
CWE
CWE-416
Use After Free