Bug 1168711 (CVE-2014-8100) - CVE-2014-8100 xorg-x11-server: out of bounds access due to not validating length or offset values in Render extension
Summary: CVE-2014-8100 xorg-x11-server: out of bounds access due to not validating len...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-8100
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1170916 1170917 1170918 1170919 1170932
Blocks: 1168310
TreeView+ depends on / blocked
 
Reported: 2014-11-27 16:03 UTC by Vasyl Kaigorodov
Modified: 2021-02-17 05:57 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server.
Clone Of:
Environment:
Last Closed: 2014-12-11 20:57:57 UTC
Embargoed:


Attachments (Terms of Use)
0014-render_check_request_size_before_reading_it_CVE-2014-8100_1-2.patch (1.18 KB, text/plain)
2014-11-27 16:04 UTC, Vasyl Kaigorodov
no flags Details
0015-render_unvalidated_lengths_in_Render_extn._swapped_procs_CVE-2014-8100_2-2.patch (4.44 KB, text/plain)
2014-11-27 16:04 UTC, Vasyl Kaigorodov
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1982 0 normal SHIPPED_LIVE Important: xorg-x11-server security update 2014-12-11 22:34:45 UTC
Red Hat Product Errata RHSA-2014:1983 0 normal SHIPPED_LIVE Important: xorg-x11-server security update 2014-12-12 00:41:58 UTC

Description Vasyl Kaigorodov 2014-11-27 16:03:59 UTC
Various Render extension calls do not check that the lengths and/or indexes sent by the
client are within the bounds specified by the caller or the bounds of
the memory allocated to hold the request read from the client, so could
read or write past the bounds of allocated memory while processing the
request. These calls all occur only after a client has successfully
authenticated itself.

Affected functions: ProcRenderQueryVersion(), SProcRenderQueryVersion(),
 SProcRenderQueryPictFormats(), SProcRenderQueryPictIndexValues(),
 SProcRenderCreatePicture(), SProcRenderChangePicture(),
 SProcRenderSetPictureClipRectangles(), SProcRenderFreePicture(),
 SProcRenderComposite(), SProcRenderScale(), SProcRenderCreateGlyphSet(),
 SProcRenderReferenceGlyphSet(), SProcRenderFreeGlyphSet(),
 SProcRenderFreeGlyphs(), SProcRenderCompositeGlyphs()

Introduced in XFree86 4.0.1 (2000).
Included in X.Org releases starting in X11R6.7 (2004).

Comment 1 Vasyl Kaigorodov 2014-11-27 16:04:19 UTC
Created attachment 962149 [details]
0014-render_check_request_size_before_reading_it_CVE-2014-8100_1-2.patch

Comment 2 Vasyl Kaigorodov 2014-11-27 16:04:22 UTC
Created attachment 962150 [details]
0015-render_unvalidated_lengths_in_Render_extn._swapped_procs_CVE-2014-8100_2-2.patch

Comment 3 Huzaifa S. Sidhpurwala 2014-12-05 06:06:52 UTC
OOb read via client request causing X server crash.

Comment 6 Vincent Danen 2014-12-09 20:17:42 UTC
External References:

http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/

Comment 7 errata-xmlrpc 2014-12-11 17:35:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:1982 https://rhn.redhat.com/errata/RHSA-2014-1982.html

Comment 8 errata-xmlrpc 2014-12-11 19:42:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2014:1983 https://rhn.redhat.com/errata/RHSA-2014-1983.html


Note You need to log in before you can comment on or make changes to this bug.