Bug 814126 - (CVE-2012-2118) CVE-2012-2118 xorg-x11-server: Input device name logging format string flaw
CVE-2012-2118 xorg-x11-server: Input device name logging format string flaw
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 814128
Blocks: 814138
  Show dependency treegraph
Reported: 2012-04-19 05:47 EDT by Jan Lieskovsky
Modified: 2015-07-31 02:50 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2012-06-28 07:10:50 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2012-04-19 05:47:13 EDT
A format string flaw was found in the way xorg-x11-server, a X.Org X11 X server, performed log message writes for certain forms of the log message to be written. If a local attacker assigned a specially-crafted name to a input device and was able to trick the system administrator in order to the local Xorg server instance to use this device, it would lead to Xorg service instance abort.

Upstream patch series:
[1] http://patchwork.freedesktop.org/patch/10000/
[2] http://patchwork.freedesktop.org/patch/9998/
[3] http://patchwork.freedesktop.org/patch/9999/
[4] http://patchwork.freedesktop.org/patch/10001/

CVE request:
[5] http://www.openwall.com/lists/oss-security/2012/04/18/8

CVE assignment:
[6] http://www.openwall.com/lists/oss-security/2012/04/19/2

Possible way to reproduce (from [4]):
1. Name a Bluetooth keyboard "%n%n%n%n%n%n%n%n"
2. Pair it with a computer running X and try to use it
3. X is not happy when trying to do the following in xf86-input-evdev:
   xf86IDrvMsg(pInfo, X_CONFIG, "Device: "%s"\n", device);
   because LogVHdrMessageVerb() has put the %n from the device name
   into a format string.
Comment 1 Jan Lieskovsky 2012-04-19 05:49:05 EDT
This issue affects the version of the xorg-x11-server package, as shipped with Red Hat Enterprise Linux 5 and 6.


This issue affects the version of the xorg-x11-server package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Comment 2 Jan Lieskovsky 2012-04-19 05:49:53 EDT
Created xorg-x11-server tracking bugs for this issue

Affects: fedora-all [bug 814128]
Comment 5 Huzaifa S. Sidhpurwala 2012-06-28 07:10:50 EDT
The version of xorg-x11-server in Red Hat Enterprise Linux 5 and 6, is protected by format string protections since its compiled with FORTIFY_SOURCE enabled. Hence the maximum impact of this flaw is limited to crash only.

Further, to exploit this issue, the attacker would need physical access to the system.


Red Hat does not consider crash of end user application such as xorg-x11-server caused by local user actions to be a security flaw.

Note You need to log in before you can comment on or make changes to this bug.