Vulnerability Description
A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X.Org | X Server | 1.20.4 |
| Redhat | Enterprise Linux | 6.0 |
| Fedoraproject | Fedora | 36 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-46343Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2151758Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202305-30
- https://www.debian.org/security/2022/dsa-5304Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2022-46343Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2151758Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202305-30
- https://www.debian.org/security/2022/dsa-5304Third Party Advisory
FAQ
What is CVE-2022-46343?
CVE-2022-46343 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local pri...
How severe is CVE-2022-46343?
CVE-2022-46343 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46343?
Check the references section above for vendor advisories and patch information. Affected products include: X.Org X Server, Redhat Enterprise Linux, Fedoraproject Fedora, Debian Debian Linux.