Bug 2106683 (CVE-2022-2320, ZDI-CAN-16070)

Summary: CVE-2022-2320 xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ajax, bdm, bskeggs, caillon+fedoraproject, jglisse, mdaenzer, ofourdan, pdwyer, peter.hutterer, rhughes, rstrode, sandmann, saroy, xgl-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-08-31 20:55:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2106689, 2108161, 2108162, 2109031, 2110433, 2110437, 2110474    
Bug Blocks: 2106409    

Description TEJ RATHI 2022-07-13 10:05:09 UTC
CVE-2022-2320/ZDI-CAN-16070: xorg-x11-server: out-of-bounds write in ProcXkbSetDeviceInfo request handler of the Xkb extension

Introduced In:
https://github.com/freedesktop/xorg-xserver/commit/c06e27b2f6fd9f7b9f827623a48876a225264132

Fixed In:
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc

Comment 1 TEJ RATHI 2022-07-13 10:17:34 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-all [bug 2106689]

Comment 6 Sandipan Roy 2022-07-25 13:08:48 UTC
Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-all [bug 2110474]

Comment 7 errata-xmlrpc 2022-08-04 13:23:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:5905 https://access.redhat.com/errata/RHSA-2022:5905

Comment 8 Product Security DevOps Team 2022-08-31 20:55:49 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2320

Comment 9 errata-xmlrpc 2022-11-08 09:44:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7583 https://access.redhat.com/errata/RHSA-2022:7583

Comment 10 errata-xmlrpc 2022-11-15 10:38:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8221 https://access.redhat.com/errata/RHSA-2022:8221

Comment 11 errata-xmlrpc 2022-11-15 10:38:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8222 https://access.redhat.com/errata/RHSA-2022:8222