Bug 1168707 (CVE-2014-8098)
Summary: | CVE-2014-8098 xorg-x11-server: out of bounds access due to not validating length or offset values in GLX extension | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ajax, chazlett, jrusnack, peter.hutterer, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Multiple out-of-bounds write flaws were found in the way the X.Org server calculated memory requirements for certain GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-12-11 20:57:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1170916, 1170917, 1170918, 1170919, 1170932 | ||
Bug Blocks: | 1168310 | ||
Attachments: |
Description
Vasyl Kaigorodov
2014-11-27 15:57:30 UTC
Created attachment 962138 [details]
0023-glx_Fix_image_size_computation_for_EXT_texture_integer_CVE-2014-8098_1-8.patch
Created attachment 962139 [details]
0025-glx_Length_checking_for_GLXRender_requests_(v2)_CVE-2014-8098_2-8.patch
Created attachment 962140 [details]
0027-glx_Length_checking_for_RenderLarge_requests_(v2)_CVE-2014-8098_3-8.patch
Created attachment 962141 [details]
0028-glx_Top-level_length_checking_for_swapped_VendorPrivate_requests_CVE-2014-8098_4-8.patch
Created attachment 962142 [details]
0029-glx_Request_length_checks_for_SetClientInfoARB_CVE-2014-8098_5-8.patch
Created attachment 962143 [details]
0030-glx_Length-checking_for_non-generated_vendor_private_requests_CVE-2014-8098_6-8.patch
Created attachment 962144 [details]
0031-glx_Length_checking_for_non-generated_single_requests_(v2)_CVE-2014-8098_7-8.patch
Created attachment 962145 [details]
0032-glx_Pass_remaining_request_length_into_->varsize_(v2)_CVE-2014-8098_8-8.patch
OOB write is possible in this case via crafted client data. This could result in arbitrary code execution or even privesc. External References: http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2014:1982 https://rhn.redhat.com/errata/RHSA-2014-1982.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2014:1983 https://rhn.redhat.com/errata/RHSA-2014-1983.html |