Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-45922: n/a

0
Medium
VulnerabilityCVE-2023-45922cvecve-2023-45922
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation violation when calling __glXGetDrawableAttribute(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:55:55 UTC

Technical Analysis

CVE-2023-45922 is a vulnerability identified in the Mesa 3D Graphics Library version 23.0.4, specifically within the glx_pbuffer.c source file. The issue arises from a segmentation violation triggered when the __glXGetDrawableAttribute() function is invoked. This function is part of the GLX (OpenGL Extension to the X Window System) interface, which facilitates rendering OpenGL content on X Window System drawables. The segmentation fault indicates improper handling of drawable attributes, potentially leading to memory corruption or integrity violations. The vulnerability is classified under CWE-754, which relates to improper handling of exceptional conditions. The CVSS v3.1 base score is 4.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). The vulnerability is disputed because typical usage scenarios do not involve an attacker-controlled X server, limiting practical exploitation. No known exploits have been reported in the wild, and no patches were listed at the time of publication. The vulnerability primarily affects systems running Mesa 23.0.4 or similar versions that include the vulnerable code path. It is relevant in environments where clients connect to potentially untrusted X servers or where remote attackers can influence GLX drawable attributes.

Potential Impact

For European organizations, the impact of CVE-2023-45922 is moderate due to its medium severity and limited exploitation scenarios. The vulnerability could allow an attacker with network access and low privileges to cause integrity issues by triggering a segmentation violation in the GLX interface, potentially leading to application crashes or memory corruption. However, it does not affect confidentiality or availability directly, and exploitation requires conditions that are uncommon in typical enterprise environments, such as an attacker controlling the X server. Organizations using Linux workstations, servers, or embedded systems with Mesa 23.0.4 or similar versions in graphical environments where remote GLX connections are permitted could be at risk. The impact is more relevant for sectors relying on graphical computing or remote graphical sessions, such as research institutions, software development firms, and media companies. The absence of known exploits and the disputed practical risk reduce the urgency but do not eliminate the need for vigilance.

Mitigation Recommendations

European organizations should monitor for official patches or updates from the Mesa project and apply them promptly once available. Until patches are released, organizations should restrict network access to X servers and GLX services, especially from untrusted or external sources, to prevent remote exploitation. Implement network segmentation and firewall rules to limit exposure of graphical services. Review and harden configurations of graphical environments to disallow connections from untrusted clients or servers. Employ application whitelisting and runtime protections to detect and prevent abnormal crashes or memory corruption attempts. For environments where remote graphical access is necessary, consider using more secure protocols or tunneling mechanisms that authenticate and encrypt sessions, reducing the risk of attacker-controlled servers. Regularly audit and update Linux distributions and graphics libraries to maintain security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47356d939959c8021acf

Added to database: 11/4/2025, 6:34:29 PM

Last enriched: 11/4/2025, 6:55:55 PM

Last updated: 11/5/2025, 3:24:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats