CVE Vulnerabilities

CVE-2022-2319

Improper Protection for Outbound Error Messages and Alert Signals

Published: Sep 01, 2022 | Modified: Feb 12, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.6 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Ubuntu
MEDIUM

A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.

Weakness

Untrusted agents can disable alerts about signal conditions exceeding limits or the response mechanism that handles such alerts.

Affected Software

Name Vendor Start Version End Version
Xorg-server X.org 21.1.0 (including) 21.1.0 (including)
Red Hat Enterprise Linux 7 RedHat xorg-x11-server-0:1.20.4-18.el7_9 *
Red Hat Enterprise Linux 8 RedHat xorg-x11-server-0:1.20.11-9.el8 *
Red Hat Enterprise Linux 8 RedHat xorg-x11-server-Xwayland-0:21.1.3-6.el8 *
Red Hat Enterprise Linux 9 RedHat xorg-x11-server-0:1.20.11-11.el9 *
Red Hat Enterprise Linux 9 RedHat xorg-x11-server-Xwayland-0:21.1.3-3.el9 *
Xorg Ubuntu trusty *
Xorg-server Ubuntu bionic *
Xorg-server Ubuntu devel *
Xorg-server Ubuntu esm-infra/bionic *
Xorg-server Ubuntu esm-infra/xenial *
Xorg-server Ubuntu focal *
Xorg-server Ubuntu impish *
Xorg-server Ubuntu jammy *
Xorg-server Ubuntu kinetic *
Xorg-server Ubuntu lunar *
Xorg-server Ubuntu mantic *
Xorg-server Ubuntu noble *
Xorg-server Ubuntu trusty *
Xorg-server Ubuntu xenial *
Xorg-server-hwe-16.04 Ubuntu esm-infra/xenial *
Xorg-server-hwe-16.04 Ubuntu xenial *
Xorg-server-hwe-18.04 Ubuntu bionic *
Xorg-server-hwe-18.04 Ubuntu esm-infra/bionic *
Xorg-server-lts-utopic Ubuntu trusty *
Xorg-server-lts-vivid Ubuntu trusty *
Xorg-server-lts-wily Ubuntu trusty *
Xorg-server-lts-xenial Ubuntu trusty *
Xwayland Ubuntu devel *
Xwayland Ubuntu impish *
Xwayland Ubuntu jammy *
Xwayland Ubuntu kinetic *
Xwayland Ubuntu lunar *
Xwayland Ubuntu mantic *
Xwayland Ubuntu noble *

Extended Description

Hardware sensors are used to detect whether a device is operating within design limits. The threshold values for these limits are set by hardware fuses or trusted software such as a BIOS.
Modification of these limits may be protected by hardware mechanisms. When device sensors detect out of bound conditions, alert signals may be generated for remedial action, which may take the form of device shutdown or throttling. Warning signals that are not properly secured may be disabled or used to generate spurious alerts, causing degraded performance or denial-of-service (DoS). These alerts may be masked by untrusted software. Examples of these alerts involve thermal and power sensor alerts.

Potential Mitigations

References