7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
12.7%
xorg-server is vulnerable to out-of-bounds access. The vulnerability exists in ProcXkbSetDeviceInfo request handler of the Xkb extension. which allows an attacker to cause an out of bound access.
access.redhat.com/errata/RHSA-2022:5905
access.redhat.com/errata/RHSA-2022:7583
access.redhat.com/errata/RHSA-2022:8221
access.redhat.com/errata/RHSA-2022:8222
access.redhat.com/security/cve/CVE-2022-2320
bugzilla.redhat.com/show_bug.cgi?id=2106683
github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.16/community.yaml
security.gentoo.org/glsa/202210-30
security.netapp.com/advisory/ntap-20221104-0003/
www.zerodayinitiative.com/advisories/ZDI-22-963/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
12.7%