{"uuid": "fa761915-fd0c-46e3-9342-0100978108e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49737", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7808", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49737\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H)\n\ud83d\udd39 Description: In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.\n\ud83d\udccf Published: 2025-03-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-17T16:07:13.541Z\n\ud83d\udd17 References:\n1. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081338\n2. https://gitlab.freedesktop.org/xorg/xserver/-/issues/1260\n3. https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=1081338;filename=dix-Hold-input-lock-for-AttachDevice.patch;msg=5\n4. https://gitlab.freedesktop.org/xorg/xserver/-/commit/dc7cb45482cea6ccec22d117ca0b489500b4d0a0", "creation_timestamp": "2025-03-17T16:47:49.000000Z"}