vulnerability

Oracle Linux: CVE-2022-46340: ELSA-2023-0045: tigervnc security update (IMPORTANT) (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Dec 14, 2022
Added
Jan 10, 2023
Modified
Dec 3, 2025

Description

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.

Solutions

oracle-linux-upgrade-tigervncoracle-linux-upgrade-tigervnc-iconsoracle-linux-upgrade-tigervnc-licenseoracle-linux-upgrade-tigervnc-selinuxoracle-linux-upgrade-tigervnc-serveroracle-linux-upgrade-tigervnc-server-appletoracle-linux-upgrade-tigervnc-server-minimaloracle-linux-upgrade-tigervnc-server-moduleoracle-linux-upgrade-xorg-x11-server-commonoracle-linux-upgrade-xorg-x11-server-develoracle-linux-upgrade-xorg-x11-server-sourceoracle-linux-upgrade-xorg-x11-server-xdmxoracle-linux-upgrade-xorg-x11-server-xephyroracle-linux-upgrade-xorg-x11-server-xnestoracle-linux-upgrade-xorg-x11-server-xorgoracle-linux-upgrade-xorg-x11-server-xvfboracle-linux-upgrade-xorg-x11-server-xwayland
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.