Bug 2151760 (CVE-2022-46344)

Summary: CVE-2022-46344 xorg-x11-server: XIChangeProperty out-of-bounds access
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ajax, jgrulich, ofourdan, peter.hutterer, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in X.Org. The issue occurs because the handler for the XIChangeProperty request has a length-validation issue, resulting in out-of-bounds memory reads and potential information disclosure. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-01-11 11:30:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2151794, 2151795, 2151796, 2151797, 2151798, 2153135, 2153136, 2153137, 2153138, 2154216, 2154217, 2154229, 2154230, 2154266    
Bug Blocks: 2151201    

Description Sandipan Roy 2022-12-08 05:10:38 UTC
CVE-2022-46344/ZDI-CAN-19405: X.Org Server XIChangeProperty
out-of-bounds access

The handler for the XIChangeProperty request has a length-validation
issues, resulting in out-of-bounds memory reads and potential
information disclosure.

Comment 2 Sandipan Roy 2022-12-08 06:35:20 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.

Comment 4 Sandipan Roy 2022-12-14 04:52:23 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-36 [bug 2153137]
Affects: fedora-37 [bug 2153138]


Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-36 [bug 2153135]
Affects: fedora-37 [bug 2153136]

Comment 5 Sandipan Roy 2022-12-16 09:59:57 UTC
Created tigervnc tracking bugs for this issue:

Affects: fedora-36 [bug 2154216]
Affects: fedora-37 [bug 2154217]

Comment 8 errata-xmlrpc 2023-01-09 14:53:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045

Comment 9 errata-xmlrpc 2023-01-09 14:53:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046

Comment 10 Product Security DevOps Team 2023-01-11 11:30:37 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-46344

Comment 11 errata-xmlrpc 2023-05-09 07:22:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248

Comment 12 errata-xmlrpc 2023-05-09 07:22:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249

Comment 13 errata-xmlrpc 2023-05-09 07:23:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257

Comment 14 errata-xmlrpc 2023-05-16 08:15:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805

Comment 15 errata-xmlrpc 2023-05-16 08:15:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806

Comment 16 errata-xmlrpc 2023-05-16 08:17:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830