A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3256-1 | xorg-server security update |
Debian DSA |
DSA-5304-1 | xorg-server security update |
EUVD |
EUVD-2022-49156 | A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. |
Ubuntu USN |
USN-5778-1 | X.Org X Server vulnerabilities |
Ubuntu USN |
USN-5778-2 | X.Org X Server vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-22T15:54:37.848Z
Reserved: 2022-11-30T00:00:00.000Z
Link: CVE-2022-46340
No data.
Status : Modified
Published: 2022-12-14T21:15:13.110
Modified: 2025-04-22T16:15:40.820
Link: CVE-2022-46340
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN