A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-46342 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2151757 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202305-30 | |
https://www.debian.org/security/2022/dsa-5304 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
30 May 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2023, 22:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
First Time |
Debian
Debian debian Linux |
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5304 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory |
12 Feb 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se | |
References |
|
02 Feb 2023, 21:22
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability was found in X.Org. This flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. |
27 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Dec 2022, 20:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CPE | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:1.20.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Fedoraproject
Redhat enterprise Linux Fedoraproject fedora Redhat X.org X.org x Server |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-46342 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2151757 - Issue Tracking, Third Party Advisory |
19 Dec 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Dec 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-46342
Mitre link : CVE-2022-46342
CVE.ORG link : CVE-2022-46342
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
x.org
- x_server
redhat
- enterprise_linux
CWE
CWE-416
Use After Free