Bug 2151755 (CVE-2022-46340) - CVE-2022-46340 xorg-x11-server: XTestSwapFakeInput stack overflow
Summary: CVE-2022-46340 xorg-x11-server: XTestSwapFakeInput stack overflow
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-46340
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2151774 2151775 2151776 2151777 2151778 2153115 2153116 2153117 2153118 2154207 2154208 2154220 2154221 2154261
Blocks: 2151201
TreeView+ depends on / blocked
 
Reported: 2022-12-08 04:44 UTC by Sandipan Roy
Modified: 2023-05-16 08:17 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.
Clone Of:
Environment:
Last Closed: 2023-01-11 09:30:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:0045 0 None None None 2023-01-09 14:53:09 UTC
Red Hat Product Errata RHSA-2023:0046 0 None None None 2023-01-09 14:53:35 UTC
Red Hat Product Errata RHSA-2023:2248 0 None None None 2023-05-09 07:21:51 UTC
Red Hat Product Errata RHSA-2023:2249 0 None None None 2023-05-09 07:22:18 UTC
Red Hat Product Errata RHSA-2023:2257 0 None None None 2023-05-09 07:23:14 UTC
Red Hat Product Errata RHSA-2023:2805 0 None None None 2023-05-16 08:15:04 UTC
Red Hat Product Errata RHSA-2023:2806 0 None None None 2023-05-16 08:15:18 UTC
Red Hat Product Errata RHSA-2023:2830 0 None None None 2023-05-16 08:17:28 UTC

Description Sandipan Roy 2022-12-08 04:44:01 UTC
CVE-2022-46340/ZDI-CAN-19265: X.Org Server XTestSwapFakeInput stack
overflow

The swap handler for the XTestFakeInput request of the XTest extension
may corrupt the stack if GenericEvents with lengths larger than 32 bytes
are sent through a the XTestFakeInput request.

This issue does not affect systems where client and server use the same
byte order.

Comment 2 Sandipan Roy 2022-12-08 06:34:21 UTC
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.

Comment 4 Sandipan Roy 2022-12-14 04:44:13 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-36 [bug 2153115]
Affects: fedora-37 [bug 2153116]


Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-36 [bug 2153117]
Affects: fedora-37 [bug 2153118]

Comment 6 Sandipan Roy 2022-12-16 09:57:04 UTC
Created tigervnc tracking bugs for this issue:

Affects: fedora-36 [bug 2154207]
Affects: fedora-37 [bug 2154208]

Comment 9 errata-xmlrpc 2023-01-09 14:53:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0045 https://access.redhat.com/errata/RHSA-2023:0045

Comment 10 errata-xmlrpc 2023-01-09 14:53:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0046 https://access.redhat.com/errata/RHSA-2023:0046

Comment 11 Product Security DevOps Team 2023-01-11 09:30:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-46340

Comment 12 errata-xmlrpc 2023-05-09 07:21:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248

Comment 13 errata-xmlrpc 2023-05-09 07:22:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249

Comment 14 errata-xmlrpc 2023-05-09 07:23:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2257 https://access.redhat.com/errata/RHSA-2023:2257

Comment 15 errata-xmlrpc 2023-05-16 08:15:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805

Comment 16 errata-xmlrpc 2023-05-16 08:15:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806

Comment 17 errata-xmlrpc 2023-05-16 08:17:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2830 https://access.redhat.com/errata/RHSA-2023:2830


Note You need to log in before you can comment on or make changes to this bug.