NA

CVE-2022-2320

Published: 01/09/2022 Updated: 01/02/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an malicious user to escalate privileges and execute arbitrary code in the context of root.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org xorg-server 21.1.0

Vendor Advisories

Debian Bug report logs - #1014903 xorg-server: CVE-2022-2319 CVE-2022-2320 Package: src:xorg-server; Maintainer for src:xorg-server is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 14 Jul 2022 08:18:01 UTC Severity: grave Tags: security, upstream ...
Jan-Niklas Sohn discovered that multiple input validation failures in the Xkb extension of the Xorg X server may result in privilege escalation if the X server is running privileged For the stable distribution (bullseye), these problems have been fixed in version 2:12011-1+deb11u2 We recommend that you upgrade your xorg-server packages For th ...
Synopsis Moderate: xorg-x11-server-Xwayland security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9Red Hat Product Security ha ...
Synopsis Moderate: xorg-x11-server security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rate ...
Synopsis Important: xorg-x11-server security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this upd ...
A flaw was found in the Xorg-x11-server An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length (CVE-2022-2319) A flaw was found in the Xorg-x11-server The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests The issue results from the lack of proper valida ...
A flaw was found in the Xorg-x11-server The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer This flaw allows an attacker to escalate privileges and execute arbitrary code in ...
The handler for the ProcXkbSetGeometry request of the Xkb extension does not properly validate the request length leading to out of bounds memory write ...

Recent Articles

X.org servers update closes 2 security holes, adds neat component tweaks
The Register • Liam Proven in Prague • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Arbitrary code execution flaws in the X Keyboard Extension were bad news

X.org has released a bunch of updates, which includes closing two security holes and, yes, this affects Wayland users too. A batch of updates to X.org's suite of X11 servers and components just appeared. Among the new features, there were also fixes for two security holes mentioned in an X.org Foundation security advisory, which covers CVE-2022-2319 and CVE-2022-2320. Although the X window system is pretty old, it's still everywhere, including on almost every xNix operating system that has a gra...