A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-46343 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2151758 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202305-30 | |
https://www.debian.org/security/2022/dsa-5304 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
30 May 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2023, 22:56
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5304 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory | |
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
12 Feb 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
02 Feb 2023, 21:22
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability was found in X.Org. This issue occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This flaw can lead to local privileges elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. |
27 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Dec 2022, 20:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject
Redhat enterprise Linux Fedoraproject fedora Redhat X.org X.org x Server |
|
CPE | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:1.20.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2151758 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-46343 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory |
19 Dec 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Dec 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-46343
Mitre link : CVE-2022-46343
CVE.ORG link : CVE-2022-46343
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
x.org
- x_server
redhat
- enterprise_linux
CWE
CWE-416
Use After Free