A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938 | third party advisory patch |
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939 | third party advisory patch |
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc | third party advisory patch |
https://www.zerodayinitiative.com/advisories/ZDI-22-963/ | vdb entry third party advisory |
https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html | third party advisory patch |
https://security.gentoo.org/glsa/202210-30 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20221104-0003/ | third party advisory |