Bug 2151757 (CVE-2022-46342)
Summary: | CVE-2022-46342 xorg-x11-server: XvdiSelectVideoNotify use-after-free | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ajax, jgrulich, ofourdan, peter.hutterer, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in X.Org. This flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-01-11 10:32:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2151784, 2151785, 2151786, 2151787, 2151788, 2153119, 2153120, 2153121, 2153123, 2154211, 2154212, 2154225, 2154226, 2154262 | ||
Bug Blocks: | 2151201 |
Description
Sandipan Roy
2022-12-08 04:50:56 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity. Created xorg-x11-server tracking bugs for this issue: Affects: fedora-36 [bug 2153121] Affects: fedora-37 [bug 2153123] Created xorg-x11-server-Xwayland tracking bugs for this issue: Affects: fedora-36 [bug 2153119] Affects: fedora-37 [bug 2153120] Created tigervnc tracking bugs for this issue: Affects: fedora-36 [bug 2154211] Affects: fedora-37 [bug 2154212] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-46342 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830 |