A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2022-46341 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2151756 - Issue Tracking, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/ - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202305-30 - | |
References | () https://www.debian.org/security/2022/dsa-5304 - Third Party Advisory |
30 May 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2023, 01:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5304 - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
26 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Dec 2022, 01:46
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:1.20.4:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2151756 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-46341 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/ - Mailing List, Third Party Advisory |
19 Dec 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 21:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46341
Mitre link : CVE-2022-46341
CVE.ORG link : CVE-2022-46341
JSON object : View
Products Affected
debian
- debian_linux
x.org
- x_server
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-787
Out-of-bounds Write