Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-46342

Опубликовано: 14 дек. 2022
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xorg-serverfixed2:21.1.5-1package
xwaylandfixed2:22.1.6-1package

Примечания

  • https://lists.x.org/archives/xorg-announce/2022-December/003302.html

  • https://gitlab.freedesktop.org/xorg/xserver/commit/b79f32b57cc0c1186b2899bce7cf89f7b325161b

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

CVSS3: 8.8
redhat
больше 2 лет назад

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

CVSS3: 8.8
nvd
больше 2 лет назад

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

CVSS3: 8.8
github
больше 2 лет назад

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость функции XvdiSelectVideoNotify реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 28%
0.00097
Низкий