First published: Tue Sep 10 2024(Updated: )
In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:21.1.13-2<=2:21.1.7-3+deb12u7 | |
X.Org Xserver | >=20.11<=21.1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49737 has been classified as a medium-severity vulnerability due to the potential for a race condition affecting data integrity in the X.Org X server.
To fix CVE-2022-49737, it is recommended to update to the latest version of the X.Org X server beyond 21.1.16 where the issue is addressed.
CVE-2022-49737 affects X.Org X server versions from 20.11 through 21.1.16.
CVE-2022-49737 is a race condition vulnerability that can lead to improper handling of data structures in the X server.
The impact of CVE-2022-49737 could allow unauthorized access to shared resources, potentially leading to system instability or security breaches.