
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-4283) was discovered in X.Org Server, disclosed in December 2022. The security flaw occurs in the XkbCopyNames function, which left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests (NVD, Debian Security).
The vulnerability stems from the XkbCopyNames function implementation in X.Org Server. When this function is called, it creates a dangling pointer to freed memory, which can later be accessed during XkbGetKbdByName requests, leading to out-of-bounds memory access. The vulnerability has been assigned a CVSS score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicating high severity (ZDI).
The vulnerability can lead to local privilege elevation on systems where the X server is running with privileged access and potentially enable remote code execution for SSH X forwarding sessions (Debian Security, MITRE).
Multiple vendors have released patches to address this vulnerability. Red Hat has released updates for Enterprise Linux 7, 8, and 9. Debian has fixed the issue in version 2:1.20.11-1+deb11u4 for the stable distribution (bullseye). Fedora has also released security updates for affected versions (Red Hat Bugzilla, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."