CVE-2022-46340/ZDI-CAN-19265: X.Org Server XTestSwapFakeInput stack overflow The swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue does not affect systems where client and server use the same byte order.
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.
Created xorg-x11-server tracking bugs for this issue: Affects: fedora-36 [bug 2153115] Affects: fedora-37 [bug 2153116] Created xorg-x11-server-Xwayland tracking bugs for this issue: Affects: fedora-36 [bug 2153117] Affects: fedora-37 [bug 2153118]
Created tigervnc tracking bugs for this issue: Affects: fedora-36 [bug 2154207] Affects: fedora-37 [bug 2154208]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-46340
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830