!195 fix CVE-2023-6478 CVE-2023-6377
From: @zppzhangpan Reviewed-by: @t_feng Signed-off-by: @t_feng
This commit is contained in:
commit
cd8a6ee88b
78
backport-CVE-2023-6377.patch
Normal file
78
backport-CVE-2023-6377.patch
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
From 0c1a93d319558fe3ab2d94f51d174b4f93810afd Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Tue, 28 Nov 2023 15:19:04 +1000
|
||||||
|
Subject: [PATCH] Xi: allocate enough XkbActions for our buttons
|
||||||
|
|
||||||
|
button->xkb_acts is supposed to be an array sufficiently large for all
|
||||||
|
our buttons, not just a single XkbActions struct. Allocating
|
||||||
|
insufficient memory here means when we memcpy() later in
|
||||||
|
XkbSetDeviceInfo we write into memory that wasn't ours to begin with,
|
||||||
|
leading to the usual security ooopsiedaisies.
|
||||||
|
|
||||||
|
CVE-2023-6377, ZDI-CAN-22412, ZDI-CAN-22413
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
|
||||||
|
Reference:https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
|
||||||
|
Conflict:NA
|
||||||
|
|
||||||
|
---
|
||||||
|
Xi/exevents.c | 12 ++++++------
|
||||||
|
dix/devices.c | 10 ++++++++++
|
||||||
|
2 files changed, 16 insertions(+), 6 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/Xi/exevents.c b/Xi/exevents.c
|
||||||
|
index dcd4efb3bc..54ea11a938 100644
|
||||||
|
--- a/Xi/exevents.c
|
||||||
|
+++ b/Xi/exevents.c
|
||||||
|
@@ -611,13 +611,13 @@ DeepCopyPointerClasses(DeviceIntPtr from, DeviceIntPtr to)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (from->button->xkb_acts) {
|
||||||
|
- if (!to->button->xkb_acts) {
|
||||||
|
- to->button->xkb_acts = calloc(1, sizeof(XkbAction));
|
||||||
|
- if (!to->button->xkb_acts)
|
||||||
|
- FatalError("[Xi] not enough memory for xkb_acts.\n");
|
||||||
|
- }
|
||||||
|
+ size_t maxbuttons = max(to->button->numButtons, from->button->numButtons);
|
||||||
|
+ to->button->xkb_acts = xnfreallocarray(to->button->xkb_acts,
|
||||||
|
+ maxbuttons,
|
||||||
|
+ sizeof(XkbAction));
|
||||||
|
+ memset(to->button->xkb_acts, 0, maxbuttons * sizeof(XkbAction));
|
||||||
|
memcpy(to->button->xkb_acts, from->button->xkb_acts,
|
||||||
|
- sizeof(XkbAction));
|
||||||
|
+ from->button->numButtons * sizeof(XkbAction));
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
free(to->button->xkb_acts);
|
||||||
|
diff --git a/dix/devices.c b/dix/devices.c
|
||||||
|
index b063128df0..3f3224d626 100644
|
||||||
|
--- a/dix/devices.c
|
||||||
|
+++ b/dix/devices.c
|
||||||
|
@@ -2539,6 +2539,8 @@ RecalculateMasterButtons(DeviceIntPtr slave)
|
||||||
|
|
||||||
|
if (master->button && master->button->numButtons != maxbuttons) {
|
||||||
|
int i;
|
||||||
|
+ int last_num_buttons = master->button->numButtons;
|
||||||
|
+
|
||||||
|
DeviceChangedEvent event = {
|
||||||
|
.header = ET_Internal,
|
||||||
|
.type = ET_DeviceChanged,
|
||||||
|
@@ -2549,6 +2551,14 @@ RecalculateMasterButtons(DeviceIntPtr slave)
|
||||||
|
};
|
||||||
|
|
||||||
|
master->button->numButtons = maxbuttons;
|
||||||
|
+ if (last_num_buttons < maxbuttons) {
|
||||||
|
+ master->button->xkb_acts = xnfreallocarray(master->button->xkb_acts,
|
||||||
|
+ maxbuttons,
|
||||||
|
+ sizeof(XkbAction));
|
||||||
|
+ memset(&master->button->xkb_acts[last_num_buttons],
|
||||||
|
+ 0,
|
||||||
|
+ (maxbuttons - last_num_buttons) * sizeof(XkbAction));
|
||||||
|
+ }
|
||||||
|
|
||||||
|
memcpy(&event.buttons.names, master->button->labels, maxbuttons *
|
||||||
|
sizeof(Atom));
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
62
backport-CVE-2023-6478.patch
Normal file
62
backport-CVE-2023-6478.patch
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
From 14f480010a93ff962fef66a16412fafff81ad632 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
||||||
|
Date: Mon, 27 Nov 2023 16:27:49 +1000
|
||||||
|
Subject: [PATCH] randr: avoid integer truncation in length check of
|
||||||
|
ProcRRChange*Property
|
||||||
|
|
||||||
|
Affected are ProcRRChangeProviderProperty and ProcRRChangeOutputProperty.
|
||||||
|
See also xserver@8f454b79 where this same bug was fixed for the core
|
||||||
|
protocol and XI.
|
||||||
|
|
||||||
|
This fixes an OOB read and the resulting information disclosure.
|
||||||
|
|
||||||
|
Length calculation for the request was clipped to a 32-bit integer. With
|
||||||
|
the correct stuff->nUnits value the expected request size was
|
||||||
|
truncated, passing the REQUEST_FIXED_SIZE check.
|
||||||
|
|
||||||
|
The server then proceeded with reading at least stuff->num_items bytes
|
||||||
|
(depending on stuff->format) from the request and stuffing whatever it
|
||||||
|
finds into the property. In the process it would also allocate at least
|
||||||
|
stuff->nUnits bytes, i.e. 4GB.
|
||||||
|
|
||||||
|
CVE-2023-6478, ZDI-CAN-22561
|
||||||
|
|
||||||
|
This vulnerability was discovered by:
|
||||||
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
||||||
|
|
||||||
|
Reference:https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
|
||||||
|
Conflict:NA
|
||||||
|
|
||||||
|
---
|
||||||
|
randr/rrproperty.c | 2 +-
|
||||||
|
randr/rrproviderproperty.c | 2 +-
|
||||||
|
2 files changed, 2 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/randr/rrproperty.c b/randr/rrproperty.c
|
||||||
|
index 25469f57b2..c4fef8a1f6 100644
|
||||||
|
--- a/randr/rrproperty.c
|
||||||
|
+++ b/randr/rrproperty.c
|
||||||
|
@@ -530,7 +530,7 @@ ProcRRChangeOutputProperty(ClientPtr client)
|
||||||
|
char format, mode;
|
||||||
|
unsigned long len;
|
||||||
|
int sizeInBytes;
|
||||||
|
- int totalSize;
|
||||||
|
+ uint64_t totalSize;
|
||||||
|
int err;
|
||||||
|
|
||||||
|
REQUEST_AT_LEAST_SIZE(xRRChangeOutputPropertyReq);
|
||||||
|
diff --git a/randr/rrproviderproperty.c b/randr/rrproviderproperty.c
|
||||||
|
index b79c17f9bf..90c5a9a933 100644
|
||||||
|
--- a/randr/rrproviderproperty.c
|
||||||
|
+++ b/randr/rrproviderproperty.c
|
||||||
|
@@ -498,7 +498,7 @@ ProcRRChangeProviderProperty(ClientPtr client)
|
||||||
|
char format, mode;
|
||||||
|
unsigned long len;
|
||||||
|
int sizeInBytes;
|
||||||
|
- int totalSize;
|
||||||
|
+ uint64_t totalSize;
|
||||||
|
int err;
|
||||||
|
|
||||||
|
REQUEST_AT_LEAST_SIZE(xRRChangeProviderPropertyReq);
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
@ -16,7 +16,7 @@
|
|||||||
|
|
||||||
Name: xorg-x11-server
|
Name: xorg-x11-server
|
||||||
Version: 1.20.11
|
Version: 1.20.11
|
||||||
Release: 23
|
Release: 24
|
||||||
Summary: X.Org X11 X server
|
Summary: X.Org X11 X server
|
||||||
License: MIT and GPLv2
|
License: MIT and GPLv2
|
||||||
URL: https://www.x.org
|
URL: https://www.x.org
|
||||||
@ -109,6 +109,8 @@ Patch6021: backport-CVE-2022-3550.patch
|
|||||||
Patch6022: render-fix-build-with-gcc12.patch
|
Patch6022: render-fix-build-with-gcc12.patch
|
||||||
Patch6023: backport-CVE-2023-5367.patch
|
Patch6023: backport-CVE-2023-5367.patch
|
||||||
Patch6024: backport-CVE-2023-5380.patch
|
Patch6024: backport-CVE-2023-5380.patch
|
||||||
|
Patch6025: backport-CVE-2023-6478.patch
|
||||||
|
Patch6026: backport-CVE-2023-6377.patch
|
||||||
|
|
||||||
BuildRequires: audit-libs-devel autoconf automake bison dbus-devel flex git gcc
|
BuildRequires: audit-libs-devel autoconf automake bison dbus-devel flex git gcc
|
||||||
BuildRequires: systemtap-sdt-devel libtool pkgconfig
|
BuildRequires: systemtap-sdt-devel libtool pkgconfig
|
||||||
@ -450,6 +452,9 @@ find %{inst_srcdir}/hw/xfree86 -name \*.c -delete
|
|||||||
%{_mandir}/man*/*
|
%{_mandir}/man*/*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Dec 15 2023 zhangpan <zhangpan103@h-partners.com> -1.20.11-24
|
||||||
|
- fix CVE-2023-6478 CVE-2023-6377
|
||||||
|
|
||||||
* Tue Nov 07 2023 zhouwenpei <zhouwenpei1@h-partners.com> -1.20.11-23
|
* Tue Nov 07 2023 zhouwenpei <zhouwenpei1@h-partners.com> -1.20.11-23
|
||||||
- Rollback CVE-2023-5574 patch
|
- Rollback CVE-2023-5574 patch
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user