CVE Vulnerabilities

CVE-2022-46342

Use After Free

Published: Dec 14, 2022 | Modified: Apr 22, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
X_server X.org 1.20.4 (including) 1.20.4 (including)
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION RedHat tigervnc-0:1.1.0-25.el6_10.13 *
Red Hat Enterprise Linux 7 RedHat tigervnc-0:1.8.0-23.el7_9 *
Red Hat Enterprise Linux 7 RedHat xorg-x11-server-0:1.20.4-21.el7_9 *
Red Hat Enterprise Linux 8 RedHat xorg-x11-server-Xwayland-0:21.1.3-10.el8 *
Red Hat Enterprise Linux 8 RedHat xorg-x11-server-0:1.20.11-15.el8 *
Red Hat Enterprise Linux 8 RedHat tigervnc-0:1.12.0-15.el8_8 *
Red Hat Enterprise Linux 9 RedHat xorg-x11-server-0:1.20.11-17.el9 *
Red Hat Enterprise Linux 9 RedHat xorg-x11-server-Xwayland-0:21.1.3-7.el9 *
Red Hat Enterprise Linux 9 RedHat tigervnc-0:1.12.0-13.el9_2 *
Xorg-server Ubuntu bionic *
Xorg-server Ubuntu devel *
Xorg-server Ubuntu esm-infra-legacy/trusty *
Xorg-server Ubuntu esm-infra/bionic *
Xorg-server Ubuntu esm-infra/focal *
Xorg-server Ubuntu esm-infra/xenial *
Xorg-server Ubuntu focal *
Xorg-server Ubuntu jammy *
Xorg-server Ubuntu kinetic *
Xorg-server Ubuntu lunar *
Xorg-server Ubuntu trusty *
Xorg-server Ubuntu trusty/esm *
Xorg-server Ubuntu xenial *
Xorg-server-hwe-16.04 Ubuntu esm-infra/xenial *
Xorg-server-hwe-16.04 Ubuntu xenial *
Xorg-server-hwe-18.04 Ubuntu bionic *
Xorg-server-hwe-18.04 Ubuntu esm-infra/bionic *
Xorg-server-lts-utopic Ubuntu trusty *
Xorg-server-lts-vivid Ubuntu trusty *
Xorg-server-lts-wily Ubuntu trusty *
Xorg-server-lts-xenial Ubuntu trusty *
Xwayland Ubuntu devel *
Xwayland Ubuntu jammy *
Xwayland Ubuntu kinetic *
Xwayland Ubuntu lunar *

Potential Mitigations

References