Bug 2151755 (CVE-2022-46340)

Summary: CVE-2022-46340 xorg-x11-server: XTestSwapFakeInput stack overflow
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ajax, dmoppert, jgrulich, ofourdan, peter.hutterer, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-01-11 09:30:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2151774, 2151775, 2151776, 2151777, 2151778, 2153115, 2153116, 2153117, 2153118, 2154207, 2154208, 2154220, 2154221, 2154261    
Bug Blocks: 2151201    

Description Sandipan Roy 2022-12-08 04:44:01 UTC
CVE-2022-46340/ZDI-CAN-19265: X.Org Server XTestSwapFakeInput stack
overflow

The swap handler for the XTestFakeInput request of the XTest extension
may corrupt the stack if GenericEvents with lengths larger than 32 bytes
are sent through a the XTestFakeInput request.

This issue does not affect systems where client and server use the same
byte order.

Comment 2 Sandipan Roy 2022-12-08 06:34:21 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.

Comment 4 Sandipan Roy 2022-12-14 04:44:13 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-36 [bug 2153115]
Affects: fedora-37 [bug 2153116]


Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-36 [bug 2153117]
Affects: fedora-37 [bug 2153118]

Comment 6 Sandipan Roy 2022-12-16 09:57:04 UTC
Created tigervnc tracking bugs for this issue:

Affects: fedora-36 [bug 2154207]
Affects: fedora-37 [bug 2154208]

Comment 9 errata-xmlrpc 2023-01-09 14:53:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045

Comment 10 errata-xmlrpc 2023-01-09 14:53:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046

Comment 11 Product Security DevOps Team 2023-01-11 09:30:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-46340

Comment 12 errata-xmlrpc 2023-05-09 07:21:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248

Comment 13 errata-xmlrpc 2023-05-09 07:22:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249

Comment 14 errata-xmlrpc 2023-05-09 07:23:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257

Comment 15 errata-xmlrpc 2023-05-16 08:15:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805

Comment 16 errata-xmlrpc 2023-05-16 08:15:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806

Comment 17 errata-xmlrpc 2023-05-16 08:17:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830