Bugzilla – Bug 1205879
VUL-0: CVE-2022-46342: xorg-x11-server, xwayland: Server XvdiSelectVideoNotify use-after-free (ZDI-CAN 19400)
Last modified: 2024-05-03 09:18:18 UTC
(temporary resume from vacation just not to block this security update until January) Now also submitted for - openSUSE:Factory/xorg-x11-server - openSUSE:Factory/xwayland Reassigning to security team.
Public now: https://lists.x.org/archives/xorg-announce/2022-December/003302.html
This is an autogenerated message for OBS integration: This bug (1205879) was mentioned in https://build.opensuse.org/request/show/1042895 Factory / xorg-x11-server https://build.opensuse.org/request/show/1042896 Factory / xwayland
SUSE-SU-2022:4485-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP3-BCL (src): xorg-x11-server-7.6_1.18.3-76.57.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): xorg-x11-server-7.6_1.18.3-76.57.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4483-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP5 (src): xorg-x11-server-1.19.6-10.40.1 SUSE Linux Enterprise Server 12-SP5 (src): xorg-x11-server-1.19.6-10.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4484-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): xorg-x11-server-1.19.6-4.39.1 SUSE OpenStack Cloud 9 (src): xorg-x11-server-1.19.6-4.39.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): xorg-x11-server-1.19.6-4.39.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): xorg-x11-server-1.19.6-4.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4487-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: openSUSE Leap 15.4 (src): xwayland-21.1.4-150400.3.6.1 SUSE Linux Enterprise Workstation Extension 15-SP4 (src): xwayland-21.1.4-150400.3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4480-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: openSUSE Leap 15.4 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 openSUSE Leap 15.3 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Manager Server 4.1 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Manager Retail Branch Server 4.1 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Manager Proxy 4.1 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Workstation Extension 15-SP4 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): xorg-x11-server-1.20.3-150200.22.5.63.1 SUSE Enterprise Storage 7 (src): xorg-x11-server-1.20.3-150200.22.5.63.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4479-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: openSUSE Leap 15.4 (src): xorg-x11-server-1.20.3-150400.38.13.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): xorg-x11-server-1.20.3-150400.38.13.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): xorg-x11-server-1.20.3-150400.38.13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4482-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): xorg-x11-server-1.19.6-150000.8.47.1 SUSE Linux Enterprise Server 15-LTSS (src): xorg-x11-server-1.19.6-150000.8.47.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): xorg-x11-server-1.19.6-150000.8.47.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): xorg-x11-server-1.19.6-150000.8.47.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4481-1: An update that solves 6 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1205874,1205875,1205876,1205877,1205878,1205879,1206017 CVE References: CVE-2022-4283,CVE-2022-46340,CVE-2022-46341,CVE-2022-46342,CVE-2022-46343,CVE-2022-46344 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE Enterprise Storage 6 (src): xorg-x11-server-1.20.3-150100.14.5.33.1 SUSE CaaS Platform 4.0 (src): xorg-x11-server-1.20.3-150100.14.5.33.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing