summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVijay Anusuri <vanusuri@mvista.com>2025-03-04 17:49:10 +0530
committerSteve Sakoman <steve@sakoman.com>2025-03-08 06:35:36 -0800
commit0f565d1c278570e42cd5172be9148e46db0eca7c (patch)
tree639b6a71ff04d6b183a0fc14d063309951fe6682
parent46014acb66ba42f9c20f31df70f291273b9faf89 (diff)
downloadpoky-0f565d1c278570e42cd5172be9148e46db0eca7c.tar.gz
xwayland: Fix CVE-2024-9632
Patch copied from xserver-xorg recipe. CVE reported for both and patch apply on both. Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/ba1d14f8eff2a123bd7ff4d48c02e1d5131358e0 (From OE-Core rev: 2158a34839068b878344d214d3fc9feeb17e504a) Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-graphics/xwayland/xwayland/CVE-2024-9632.patch59
-rw-r--r--meta/recipes-graphics/xwayland/xwayland_22.1.8.bb1
2 files changed, 60 insertions, 0 deletions
diff --git a/meta/recipes-graphics/xwayland/xwayland/CVE-2024-9632.patch b/meta/recipes-graphics/xwayland/xwayland/CVE-2024-9632.patch
new file mode 100644
index 0000000000..54888f6347
--- /dev/null
+++ b/meta/recipes-graphics/xwayland/xwayland/CVE-2024-9632.patch
@@ -0,0 +1,59 @@
1From ba1d14f8eff2a123bd7ff4d48c02e1d5131358e0 Mon Sep 17 00:00:00 2001
2From: Matthieu Herrb <matthieu@herrb.eu>
3Date: Thu, 10 Oct 2024 10:37:28 +0200
4Subject: [PATCH] xkb: Fix buffer overflow in _XkbSetCompatMap()
5
6The _XkbSetCompatMap() function attempts to resize the `sym_interpret`
7buffer.
8
9However, It didn't update its size properly. It updated `num_si` only,
10without updating `size_si`.
11
12This may lead to local privilege escalation if the server is run as root
13or remote code execution (e.g. x11 over ssh).
14
15CVE-2024-9632, ZDI-CAN-24756
16
17This vulnerability was discovered by:
18Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
19
20Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
21Tested-by: Peter Hutterer <peter.hutterer@who-t.net>
22Reviewed-by: José Expósito <jexposit@redhat.com>
23(cherry picked from commit 85b77657)
24
25Part-of: <!1734>
26
27CVE: CVE-2024-9632
28Upstream-Status: Backport [https://gitlab.freedesktop.org/xorg/xserver/-/commit/ba1d14f8eff2a123bd7ff4d48c02e1d5131358e0]
29
30Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
31Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
32---
33 xkb/xkb.c | 8 ++++----
34 1 file changed, 4 insertions(+), 4 deletions(-)
35
36diff --git a/xkb/xkb.c b/xkb/xkb.c
37index 276dc19..7da00a0 100644
38--- a/xkb/xkb.c
39+++ b/xkb/xkb.c
40@@ -2992,13 +2992,13 @@ _XkbSetCompatMap(ClientPtr client, DeviceIntPtr dev,
41 XkbSymInterpretPtr sym;
42 unsigned int skipped = 0;
43
44- if ((unsigned) (req->firstSI + req->nSI) > compat->num_si) {
45- compat->num_si = req->firstSI + req->nSI;
46+ if ((unsigned) (req->firstSI + req->nSI) > compat->size_si) {
47+ compat->num_si = compat->size_si = req->firstSI + req->nSI;
48 compat->sym_interpret = reallocarray(compat->sym_interpret,
49- compat->num_si,
50+ compat->size_si,
51 sizeof(XkbSymInterpretRec));
52 if (!compat->sym_interpret) {
53- compat->num_si = 0;
54+ compat->num_si = compat->size_si = 0;
55 return BadAlloc;
56 }
57 }
58--
592.40.0
diff --git a/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb b/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb
index 258a875697..23575b387e 100644
--- a/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb
+++ b/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb
@@ -28,6 +28,7 @@ SRC_URI = "https://www.x.org/archive/individual/xserver/xwayland-${PV}.tar.xz \
28 file://CVE-2024-31081.patch \ 28 file://CVE-2024-31081.patch \
29 file://CVE-2024-31083-0001.patch \ 29 file://CVE-2024-31083-0001.patch \
30 file://CVE-2024-31083-0002.patch \ 30 file://CVE-2024-31083-0002.patch \
31 file://CVE-2024-9632.patch \
31" 32"
32SRC_URI[sha256sum] = "d11eeee73290b88ea8da42a7d9350dedfaba856ce4ae44e58c045ad9ecaa2f73" 33SRC_URI[sha256sum] = "d11eeee73290b88ea8da42a7d9350dedfaba856ce4ae44e58c045ad9ecaa2f73"
33 34