fkie_cve-2022-49737
Vulnerability from fkie_nvd
Published
2025-03-16 01:15
Modified
2025-03-17 16:15
Severity ?
Summary
In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock." }, { "lang": "es", "value": "En el servidor X de X.Org (versi\u00f3n 20.11 a 21.1.16), cuando una aplicaci\u00f3n cliente usa easystroke para los gestos del rat\u00f3n, el hilo principal modifica diversas estructuras de datos utilizadas por el hilo de entrada sin adquirir un bloqueo (es decir, una condici\u00f3n de ejecuci\u00f3n). En particular, AttachDevice en dix/devices.c no adquiere un bloqueo de entrada." } ], "id": "CVE-2022-49737", "lastModified": "2025-03-17T16:15:17.540", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.3, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2025-03-16T01:15:35.543", "references": [ { "source": "cve@mitre.org", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5" }, { "source": "cve@mitre.org", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338" }, { "source": "cve@mitre.org", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0" }, { "source": "cve@mitre.org", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-413" } ], "source": "cve@mitre.org", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…