{"id":"UBUNTU-CVE-2022-49737","details":"In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.","modified":"2026-01-30T20:11:28.130183Z","published":"2025-03-16T01:15:00Z","upstream":["CVE-2022-49737"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49737"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-49737"}],"affected":[{"package":{"name":"xorg-server","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.11+esm12?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.14.3-3ubuntu2","2:1.14.3-3ubuntu3","2:1.14.3-3ubuntu4","2:1.14.3-5ubuntu1","2:1.14.4-1ubuntu1","2:1.14.4-1ubuntu2","2:1.14.4.901-0ubuntu2","2:1.14.5-1ubuntu2","2:1.14.5-1ubuntu4","2:1.15.0-1ubuntu1","2:1.15.0-1ubuntu2","2:1.15.0-1ubuntu3","2:1.15.0-1ubuntu4","2:1.15.0-1ubuntu6","2:1.15.0-1ubuntu7","2:1.15.1-0ubuntu1","2:1.15.1-0ubuntu2","2:1.15.1-0ubuntu2.1","2:1.15.1-0ubuntu2.4","2:1.15.1-0ubuntu2.5","2:1.15.1-0ubuntu2.6","2:1.15.1-0ubuntu2.7","2:1.15.1-0ubuntu2.9","2:1.15.1-0ubuntu2.10","2:1.15.1-0ubuntu2.11","2:1.15.1-0ubuntu2.11+esm2","2:1.15.1-0ubuntu2.11+esm3","2:1.15.1-0ubuntu2.11+esm4","2:1.15.1-0ubuntu2.11+esm5","2:1.15.1-0ubuntu2.11+esm6","2:1.15.1-0ubuntu2.11+esm7","2:1.15.1-0ubuntu2.11+esm8","2:1.15.1-0ubuntu2.11+esm9","2:1.15.1-0ubuntu2.11+esm11","2:1.15.1-0ubuntu2.11+esm12"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xdmx"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xdmx-tools"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xnest"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xorg-server-source"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xserver-common"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xserver-xephyr"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xserver-xorg-xmir"},{"binary_version":"2:1.15.1-0ubuntu2.11+esm12","binary_name":"xvfb"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.12+esm18?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.17.2-1ubuntu9","2:1.17.2-1ubuntu10","2:1.17.3-2ubuntu1","2:1.17.3-2ubuntu2","2:1.17.3-2ubuntu3","2:1.17.3-2ubuntu4","2:1.18.1-1ubuntu3","2:1.18.1-1ubuntu4","2:1.18.3-1ubuntu1","2:1.18.3-1ubuntu2","2:1.18.3-1ubuntu2.2","2:1.18.3-1ubuntu2.3","2:1.18.4-0ubuntu0.1","2:1.18.4-0ubuntu0.2","2:1.18.4-0ubuntu0.3","2:1.18.4-0ubuntu0.4","2:1.18.4-0ubuntu0.6","2:1.18.4-0ubuntu0.7","2:1.18.4-0ubuntu0.8","2:1.18.4-0ubuntu0.9","2:1.18.4-0ubuntu0.10","2:1.18.4-0ubuntu0.11","2:1.18.4-0ubuntu0.12","2:1.18.4-0ubuntu0.12+esm1","2:1.18.4-0ubuntu0.12+esm2","2:1.18.4-0ubuntu0.12+esm4","2:1.18.4-0ubuntu0.12+esm5","2:1.18.4-0ubuntu0.12+esm6","2:1.18.4-0ubuntu0.12+esm8","2:1.18.4-0ubuntu0.12+esm9","2:1.18.4-0ubuntu0.12+esm10","2:1.18.4-0ubuntu0.12+esm12","2:1.18.4-0ubuntu0.12+esm13","2:1.18.4-0ubuntu0.12+esm14","2:1.18.4-0ubuntu0.12+esm15","2:1.18.4-0ubuntu0.12+esm16","2:1.18.4-0ubuntu0.12+esm17","2:1.18.4-0ubuntu0.12+esm18"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xdmx"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xdmx-tools"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xmir"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xnest"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xorg-server-source"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-common"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-xephyr"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xserver-xorg-xmir"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xvfb"},{"binary_version":"2:1.18.4-0ubuntu0.12+esm18","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server-hwe-16.04","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.19.6-1ubuntu4.1~16.04.6+esm10?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.18.4-1ubuntu6.1~16.04.1","2:1.18.4-1ubuntu6.1~16.04.2","2:1.19.3-1ubuntu1~16.04.2","2:1.19.3-1ubuntu1~16.04.3","2:1.19.3-1ubuntu1~16.04.4","2:1.19.5-0ubuntu2~16.04.1","2:1.19.6-1ubuntu4~16.04.1","2:1.19.6-1ubuntu4.1~16.04.1","2:1.19.6-1ubuntu4.1~16.04.2","2:1.19.6-1ubuntu4.1~16.04.3","2:1.19.6-1ubuntu4.1~16.04.4","2:1.19.6-1ubuntu4.1~16.04.5","2:1.19.6-1ubuntu4.1~16.04.6","2:1.19.6-1ubuntu4.1~16.04.6+esm1","2:1.19.6-1ubuntu4.1~16.04.6+esm3","2:1.19.6-1ubuntu4.1~16.04.6+esm4","2:1.19.6-1ubuntu4.1~16.04.6+esm5","2:1.19.6-1ubuntu4.1~16.04.6+esm6","2:1.19.6-1ubuntu4.1~16.04.6+esm7","2:1.19.6-1ubuntu4.1~16.04.6+esm8","2:1.19.6-1ubuntu4.1~16.04.6+esm9","2:1.19.6-1ubuntu4.1~16.04.6+esm10"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xmir-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xorg-server-source-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xserver-xephyr-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xserver-xorg-core-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xserver-xorg-dev-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xserver-xorg-legacy-hwe-16.04"},{"binary_version":"2:1.19.6-1ubuntu4.1~16.04.6+esm10","binary_name":"xwayland-hwe-16.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.19.6-1ubuntu4.15+esm13?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.19.5-0ubuntu2","2:1.19.6-1ubuntu1","2:1.19.6-1ubuntu2","2:1.19.6-1ubuntu3","2:1.19.6-1ubuntu4","2:1.19.6-1ubuntu4.1","2:1.19.6-1ubuntu4.2","2:1.19.6-1ubuntu4.3","2:1.19.6-1ubuntu4.4","2:1.19.6-1ubuntu4.5","2:1.19.6-1ubuntu4.6","2:1.19.6-1ubuntu4.7","2:1.19.6-1ubuntu4.8","2:1.19.6-1ubuntu4.9","2:1.19.6-1ubuntu4.10","2:1.19.6-1ubuntu4.11","2:1.19.6-1ubuntu4.12","2:1.19.6-1ubuntu4.13","2:1.19.6-1ubuntu4.14","2:1.19.6-1ubuntu4.15","2:1.19.6-1ubuntu4.15+esm1","2:1.19.6-1ubuntu4.15+esm3","2:1.19.6-1ubuntu4.15+esm4","2:1.19.6-1ubuntu4.15+esm5","2:1.19.6-1ubuntu4.15+esm7","2:1.19.6-1ubuntu4.15+esm8","2:1.19.6-1ubuntu4.15+esm9","2:1.19.6-1ubuntu4.15+esm10","2:1.19.6-1ubuntu4.15+esm11","2:1.19.6-1ubuntu4.15+esm12","2:1.19.6-1ubuntu4.15+esm13"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xdmx"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xdmx-tools"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xmir"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xnest"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xorg-server-source"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-common"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-xephyr"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xserver-xorg-xmir"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xvfb"},{"binary_version":"2:1.19.6-1ubuntu4.15+esm13","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server-hwe-18.04","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/xorg-server-hwe-18.04@2:1.20.8-2ubuntu2.2~18.04.11+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.20.1-3ubuntu2.1~18.04.1","2:1.20.4-1ubuntu3~18.04.1","2:1.20.5+git20191008-0ubuntu1~18.04.1","2:1.20.8-2ubuntu2.1~18.04.1","2:1.20.8-2ubuntu2.2~18.04.1","2:1.20.8-2ubuntu2.2~18.04.2","2:1.20.8-2ubuntu2.2~18.04.3","2:1.20.8-2ubuntu2.2~18.04.4","2:1.20.8-2ubuntu2.2~18.04.5","2:1.20.8-2ubuntu2.2~18.04.6","2:1.20.8-2ubuntu2.2~18.04.7","2:1.20.8-2ubuntu2.2~18.04.8","2:1.20.8-2ubuntu2.2~18.04.9","2:1.20.8-2ubuntu2.2~18.04.10","2:1.20.8-2ubuntu2.2~18.04.11","2:1.20.8-2ubuntu2.2~18.04.11+esm1","2:1.20.8-2ubuntu2.2~18.04.11+esm2","2:1.20.8-2ubuntu2.2~18.04.11+esm3","2:1.20.8-2ubuntu2.2~18.04.11+esm4","2:1.20.8-2ubuntu2.2~18.04.11+esm5"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xorg-server-source-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xserver-xephyr-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xserver-xorg-core-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xserver-xorg-dev-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xserver-xorg-legacy-hwe-18.04"},{"binary_version":"2:1.20.8-2ubuntu2.2~18.04.11+esm5","binary_name":"xwayland-hwe-18.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.20.13-1ubuntu1~20.04.20+esm1?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.20.5+git20191008-0ubuntu1","2:1.20.6-1ubuntu1","2:1.20.7-2ubuntu1","2:1.20.7-2ubuntu2","2:1.20.8-2ubuntu2","2:1.20.8-2ubuntu2.1","2:1.20.8-2ubuntu2.2","2:1.20.8-2ubuntu2.3","2:1.20.8-2ubuntu2.4","2:1.20.8-2ubuntu2.6","2:1.20.9-2ubuntu1.1~20.04.1","2:1.20.9-2ubuntu1.2~20.04.1","2:1.20.9-2ubuntu1.2~20.04.2","2:1.20.11-1ubuntu1~20.04.2","2:1.20.13-1ubuntu1~20.04.2","2:1.20.13-1ubuntu1~20.04.3","2:1.20.13-1ubuntu1~20.04.4","2:1.20.13-1ubuntu1~20.04.5","2:1.20.13-1ubuntu1~20.04.6","2:1.20.13-1ubuntu1~20.04.8","2:1.20.13-1ubuntu1~20.04.9","2:1.20.13-1ubuntu1~20.04.12","2:1.20.13-1ubuntu1~20.04.14","2:1.20.13-1ubuntu1~20.04.15","2:1.20.13-1ubuntu1~20.04.16","2:1.20.13-1ubuntu1~20.04.17","2:1.20.13-1ubuntu1~20.04.18","2:1.20.13-1ubuntu1~20.04.19","2:1.20.13-1ubuntu1~20.04.20","2:1.20.13-1ubuntu1~20.04.20+esm1"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xdmx"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xdmx-tools"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xnest"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xorg-server-source"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xserver-common"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xserver-xephyr"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xserver-xorg-core"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xserver-xorg-dev"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xvfb"},{"binary_version":"2:1.20.13-1ubuntu1~20.04.20+esm1","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:21.1.4-2ubuntu1.7~22.04.16?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:1.20.13-1ubuntu1","2:1.20.13-1ubuntu2","2:1.20.14-1ubuntu1","2:21.1.3-2ubuntu2","2:21.1.3-2ubuntu2.1","2:21.1.3-2ubuntu2.2","2:21.1.3-2ubuntu2.3","2:21.1.3-2ubuntu2.4","2:21.1.3-2ubuntu2.5","2:21.1.3-2ubuntu2.6","2:21.1.3-2ubuntu2.7","2:21.1.3-2ubuntu2.8","2:21.1.3-2ubuntu2.9","2:21.1.4-2ubuntu1.7~22.04.1","2:21.1.4-2ubuntu1.7~22.04.2","2:21.1.4-2ubuntu1.7~22.04.5","2:21.1.4-2ubuntu1.7~22.04.7","2:21.1.4-2ubuntu1.7~22.04.8","2:21.1.4-2ubuntu1.7~22.04.9","2:21.1.4-2ubuntu1.7~22.04.10","2:21.1.4-2ubuntu1.7~22.04.11","2:21.1.4-2ubuntu1.7~22.04.12","2:21.1.4-2ubuntu1.7~22.04.13","2:21.1.4-2ubuntu1.7~22.04.14","2:21.1.4-2ubuntu1.7~22.04.15","2:21.1.4-2ubuntu1.7~22.04.16"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xnest"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xorg-server-source"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xserver-common"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xserver-xephyr"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xserver-xorg-core"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xserver-xorg-dev"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:21.1.4-2ubuntu1.7~22.04.16","binary_name":"xvfb"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xwayland@2:22.1.1-1ubuntu0.20?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:21.1.2-0ubuntu1","2:21.1.3-1","2:21.1.3-1ubuntu1","2:21.1.4-1","2:22.1.0-1","2:22.1.1-1","2:22.1.1-1ubuntu0.1","2:22.1.1-1ubuntu0.2","2:22.1.1-1ubuntu0.3","2:22.1.1-1ubuntu0.4","2:22.1.1-1ubuntu0.5","2:22.1.1-1ubuntu0.6","2:22.1.1-1ubuntu0.7","2:22.1.1-1ubuntu0.9","2:22.1.1-1ubuntu0.10","2:22.1.1-1ubuntu0.11","2:22.1.1-1ubuntu0.12","2:22.1.1-1ubuntu0.13","2:22.1.1-1ubuntu0.14","2:22.1.1-1ubuntu0.15","2:22.1.1-1ubuntu0.17","2:22.1.1-1ubuntu0.18","2:22.1.1-1ubuntu0.19","2:22.1.1-1ubuntu0.20"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:22.1.1-1ubuntu0.20","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:21.1.12-1ubuntu1.5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:21.1.7-3ubuntu2","2:21.1.7-3ubuntu2.1","2:21.1.10-1ubuntu1","2:21.1.11-2ubuntu1","2:21.1.12-1ubuntu1","2:21.1.12-1ubuntu1.1","2:21.1.12-1ubuntu1.2","2:21.1.12-1ubuntu1.3","2:21.1.12-1ubuntu1.4","2:21.1.12-1ubuntu1.5"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xnest"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xorg-server-source"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xserver-common"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xserver-xephyr"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xserver-xorg-core"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xserver-xorg-dev"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:21.1.12-1ubuntu1.5","binary_name":"xvfb"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/xwayland@2:23.2.6-1ubuntu0.8?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:23.2.0-1","2:23.2.0-1ubuntu0.1","2:23.2.3-1","2:23.2.4-1","2:23.2.4-1build1","2:23.2.4-1build2","2:23.2.4-1build3","2:23.2.6-1","2:23.2.6-1ubuntu0.1","2:23.2.6-1ubuntu0.2","2:23.2.6-1ubuntu0.4","2:23.2.6-1ubuntu0.5","2:23.2.6-1ubuntu0.6","2:23.2.6-1ubuntu0.7","2:23.2.6-1ubuntu0.8"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:23.2.6-1ubuntu0.8","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xorg-server","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/xorg-server@2:21.1.18-1ubuntu1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:21.1.18-1ubuntu1"}]}],"versions":["2:21.1.16-1ubuntu1"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","availability":"No subscription required","binaries":[{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xnest"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xorg-server-source"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xserver-common"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xserver-xephyr"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xserver-xorg-core"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xserver-xorg-dev"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xserver-xorg-legacy"},{"binary_version":"2:21.1.18-1ubuntu1","binary_name":"xvfb"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}},{"package":{"name":"xwayland","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/xwayland@2:24.1.6-1ubuntu1.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:24.1.6-1","2:24.1.6-1ubuntu1","2:24.1.6-1ubuntu1.1"],"ecosystem_specific":{"priority_reason":"This is a minor severity issue","binaries":[{"binary_version":"2:24.1.6-1ubuntu1.1","binary_name":"xwayland"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-49737.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"type":"Ubuntu","score":"low"}]}