Files
xserver/xkb
Peter Hutterer ccdd431cd8 xkb: reset the radio_groups pointer to NULL after freeing it
Unlike other elements of the keymap, this pointer was freed but not
reset. On a subsequent XkbGetKbdByName request, the server may access
already freed memory.

CVE-2022-4283, ZDI-CAN-19530

This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative

Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
Acked-by: Olivier Fourdan <ofourdan@redhat.com>
2022-12-14 11:02:40 +10:00
..
2014-11-12 10:25:00 +10:00
2014-11-12 10:25:00 +10:00
2014-11-12 10:25:00 +10:00
2014-11-12 10:25:00 +10:00
2022-07-08 14:27:04 +00:00
2014-11-12 10:25:00 +10:00
2022-07-08 14:27:04 +00:00
2022-07-08 14:27:04 +00:00
2017-10-30 13:45:20 -04:00
2022-07-08 14:27:04 +00:00
2022-07-08 14:27:04 +00:00
2014-11-12 10:25:00 +10:00
2022-07-08 14:27:04 +00:00
2022-07-08 14:27:04 +00:00
2017-03-23 13:19:51 -04:00
2014-11-12 10:25:00 +10:00
2022-07-08 14:27:04 +00:00
2022-04-02 18:06:30 +00:00

The X server uses this directory to store the compiled version of the
current keymap and/or any scratch keymaps used by clients.  The X server
or some other tool might destroy or replace the files in this directory,
so it is not a safe place to store compiled keymaps for long periods of
time.  The default keymap for any server is usually stored in:
     X<num>-default.xkm
where <num> is the display number of the server in question, which makes
it possible for several servers *on the same host* to share the same 
directory.

Unless the X server is modified, sharing this directory between servers on
different hosts could cause problems.