Bug 2151761 (CVE-2022-4283)

Summary: CVE-2022-4283 xorg-x11-server: XkbGetKbdByName use-after-free
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ajax, jgrulich, ofourdan, peter.hutterer, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in X.Org. This issue occurs because the XkbCopyNames function leaves a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-01-11 12:00:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2151799, 2151800, 2151801, 2151802, 2151803, 2153127, 2153128, 2153129, 2153130, 2154205, 2154206, 2154233, 2154234, 2154267    
Bug Blocks: 2151201    

Description Sandipan Roy 2022-12-08 05:12:22 UTC
CVE-2022-4283/ZDI-CAN-19530: X.Org Server XkbGetKbdByName use-after-free

The XkbCopyNames function left a dangling pointer to freed memory, 
resulting in out-of-bounds memory access on subsequent XkbGetKbdByName 
requests.

Comment 2 Sandipan Roy 2022-12-08 06:35:29 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.

Comment 5 Sandipan Roy 2022-12-14 04:45:23 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-36 [bug 2153127]
Affects: fedora-37 [bug 2153128]


Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-36 [bug 2153129]
Affects: fedora-37 [bug 2153130]

Comment 6 Sandipan Roy 2022-12-16 09:56:26 UTC
Created tigervnc tracking bugs for this issue:

Affects: fedora-36 [bug 2154205]
Affects: fedora-37 [bug 2154206]

Comment 9 errata-xmlrpc 2023-01-09 14:53:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045

Comment 10 errata-xmlrpc 2023-01-09 14:53:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046

Comment 11 Product Security DevOps Team 2023-01-11 12:00:38 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-4283

Comment 12 errata-xmlrpc 2023-05-09 07:22:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248

Comment 13 errata-xmlrpc 2023-05-09 07:22:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249

Comment 14 errata-xmlrpc 2023-05-09 07:23:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257

Comment 15 errata-xmlrpc 2023-05-16 08:15:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805

Comment 16 errata-xmlrpc 2023-05-16 08:15:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806

Comment 17 errata-xmlrpc 2023-05-16 08:17:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830