A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3256-1 xorg-server security update
Debian DSA Debian DSA DSA-5304-1 xorg-server security update
EUVD EUVD EUVD-2022-49156 A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
Ubuntu USN Ubuntu USN USN-5778-1 X.Org X Server vulnerabilities
Ubuntu USN Ubuntu USN USN-5778-2 X.Org X Server vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-22T15:54:37.848Z

Reserved: 2022-11-30T00:00:00.000Z

Link: CVE-2022-46340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-12-14T21:15:13.110

Modified: 2025-04-22T16:15:40.820

Link: CVE-2022-46340

cve-icon Redhat

Severity : Important

Publid Date: 2022-12-14T00:00:00Z

Links: CVE-2022-46340 - Bugzilla

cve-icon OpenCVE Enrichment

No data.