Bug 2151758 (CVE-2022-46343)
Summary: | CVE-2022-46343 xorg-x11-server: ScreenSaverSetAttributes use-after-free | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ajax, jgrulich, ofourdan, peter.hutterer, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in X.Org. This issue occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This flaw can lead to local privileges elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-01-11 11:00:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2151789, 2151790, 2151791, 2151792, 2151793, 2153122, 2153124, 2153125, 2153126, 2154213, 2154215, 2154227, 2154228, 2154265 | ||
Bug Blocks: | 2151201 |
Description
Sandipan Roy
2022-12-08 05:08:33 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity. Created xorg-x11-server tracking bugs for this issue: Affects: fedora-36 [bug 2153122] Affects: fedora-37 [bug 2153124] Created xorg-x11-server-Xwayland tracking bugs for this issue: Affects: fedora-36 [bug 2153125] Affects: fedora-37 [bug 2153126] Created tigervnc tracking bugs for this issue: Affects: fedora-36 [bug 2154213] Affects: fedora-37 [bug 2154215] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-46343 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830 |