diff options
author | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2020-12-10 10:24:29 +0100 |
---|---|---|
committer | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2021-01-15 16:38:11 +0100 |
commit | 4eba4f53ad8c62c27c12835e58184d66121ff636 (patch) | |
tree | c1a6376444443773b4b0673cbaa5d2ca9ad383e6 /nx-X11/programs/Xserver/hw/nxagent/Millis.c | |
parent | 89b37de7c923337cc403480e6db44000bdd0674a (diff) | |
download | nx-libs-4eba4f53ad8c62c27c12835e58184d66121ff636.tar.gz nx-libs-4eba4f53ad8c62c27c12835e58184d66121ff636.tar.bz2 nx-libs-4eba4f53ad8c62c27c12835e58184d66121ff636.zip |
CVE-2020-14360: Check SetMap request length carefully.
Backported from X.org:
From 446ff2d3177087b8173fa779fa5b77a2a128988b Mon Sep 17 00:00:00 2001
From: Matthieu Herrb <matthieu@herrb.eu>
Date: Thu, 12 Nov 2020 19:15:07 +0100
Subject: [PATCH] Check SetMap request length carefully.
Avoid out of bounds memory accesses on too short request.
ZDI-CAN 11572 / CVE-2020-14360
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Fixes ArcticaProject/nx-libs#972.
Diffstat (limited to 'nx-X11/programs/Xserver/hw/nxagent/Millis.c')
0 files changed, 0 insertions, 0 deletions