summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorVijay Anusuri <vanusuri@mvista.com>2025-11-13 13:37:40 +0530
committerSteve Sakoman <steve@sakoman.com>2025-11-19 08:21:24 -0800
commit748f958fd39c1325cfcc081ea78d8eb1acde79aa (patch)
tree89a506e504a3a34b14dcf1af07ee9afa81d4c3d1 /meta
parent73e3da5d440926b29bf208e272b1d8dfb3dcb6b1 (diff)
downloadpoky-748f958fd39c1325cfcc081ea78d8eb1acde79aa.tar.gz
xserver-xorg: Fix for CVE-2025-62231
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/3baad99f9c15028ed8c3e3d8408e5ec35db155aa (From OE-Core rev: 05fe08caa0d4bd30510b496a300731a9754f24b8) Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2025-62231.patch53
-rw-r--r--meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.8.bb1
2 files changed, 54 insertions, 0 deletions
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2025-62231.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2025-62231.patch
new file mode 100644
index 0000000000..4bcf362531
--- /dev/null
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2025-62231.patch
@@ -0,0 +1,53 @@
1From 3baad99f9c15028ed8c3e3d8408e5ec35db155aa Mon Sep 17 00:00:00 2001
2From: Olivier Fourdan <ofourdan@redhat.com>
3Date: Wed, 10 Sep 2025 16:30:29 +0200
4Subject: [PATCH] xkb: Prevent overflow in XkbSetCompatMap()
5MIME-Version: 1.0
6Content-Type: text/plain; charset=UTF-8
7Content-Transfer-Encoding: 8bit
8
9The XkbCompatMap structure stores its "num_si" and "size_si" fields
10using an unsigned short.
11
12However, the function _XkbSetCompatMap() will store the sum of the
13input data "firstSI" and "nSI" in both XkbCompatMap's "num_si" and
14"size_si" without first checking if the sum overflows the maximum
15unsigned short value, leading to a possible overflow.
16
17To avoid the issue, check whether the sum does not exceed the maximum
18unsigned short value, or return a "BadValue" error otherwise.
19
20CVE-2025-62231, ZDI-CAN-27560
21
22This vulnerability was discovered by:
23Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
24
25Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
26Reviewed-by: Michel Dänzer <mdaenzer@redhat.com>
27(cherry picked from commit 475d9f49acd0e55bc0b089ed77f732ad18585470)
28
29Part-of: <https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/2087>
30
31Upstream-Status: Backport [https://gitlab.freedesktop.org/xorg/xserver/-/commit/3baad99f9c15028ed8c3e3d8408e5ec35db155aa]
32CVE: CVE-2025-62231
33Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
34---
35 xkb/xkb.c | 2 ++
36 1 file changed, 2 insertions(+)
37
38diff --git a/xkb/xkb.c b/xkb/xkb.c
39index 26d965d482..137d70da27 100644
40--- a/xkb/xkb.c
41+++ b/xkb/xkb.c
42@@ -2992,6 +2992,8 @@ _XkbSetCompatMap(ClientPtr client, DeviceIntPtr dev,
43 XkbSymInterpretPtr sym;
44 unsigned int skipped = 0;
45
46+ if ((unsigned) (req->firstSI + req->nSI) > USHRT_MAX)
47+ return BadValue;
48 if ((unsigned) (req->firstSI + req->nSI) > compat->size_si) {
49 compat->num_si = compat->size_si = req->firstSI + req->nSI;
50 compat->sym_interpret = reallocarray(compat->sym_interpret,
51--
52GitLab
53
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.8.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.8.bb
index ed543f6270..1d486fc0bc 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.8.bb
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.8.bb
@@ -47,6 +47,7 @@ SRC_URI += "file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.pat
47 file://CVE-2025-62229.patch \ 47 file://CVE-2025-62229.patch \
48 file://CVE-2025-62230-1.patch \ 48 file://CVE-2025-62230-1.patch \
49 file://CVE-2025-62230-2.patch \ 49 file://CVE-2025-62230-2.patch \
50 file://CVE-2025-62231.patch \
50 " 51 "
51SRC_URI[sha256sum] = "38aadb735650c8024ee25211c190bf8aad844c5f59632761ab1ef4c4d5aeb152" 52SRC_URI[sha256sum] = "38aadb735650c8024ee25211c190bf8aad844c5f59632761ab1ef4c4d5aeb152"
52 53