Bug 2151755 (CVE-2022-46340)
Summary: | CVE-2022-46340 xorg-x11-server: XTestSwapFakeInput stack overflow | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ajax, dmoppert, jgrulich, ofourdan, peter.hutterer, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-01-11 09:30:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2151774, 2151775, 2151776, 2151777, 2151778, 2153115, 2153116, 2153117, 2153118, 2154207, 2154208, 2154220, 2154221, 2154261 | ||
Bug Blocks: | 2151201 |
Description
Sandipan Roy
2022-12-08 04:44:01 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity. Created xorg-x11-server tracking bugs for this issue: Affects: fedora-36 [bug 2153115] Affects: fedora-37 [bug 2153116] Created xorg-x11-server-Xwayland tracking bugs for this issue: Affects: fedora-36 [bug 2153117] Affects: fedora-37 [bug 2153118] Created tigervnc tracking bugs for this issue: Affects: fedora-36 [bug 2154207] Affects: fedora-37 [bug 2154208] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-46340 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830 |