diff options
author | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2020-12-10 10:24:29 +0100 |
---|---|---|
committer | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2020-12-10 10:30:06 +0100 |
commit | d5a3b440130257e08f7e507eae711885b4f4db50 (patch) | |
tree | e2bc33ba6e01d03e3733d83843f62b5c15e1943c /nx-X11/programs/Xserver/hw/nxagent/NXshm.c | |
parent | ad275d50720fbbaf65bc0668eed0297df5d27cad (diff) | |
download | nx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.tar.gz nx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.tar.bz2 nx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.zip |
CVE-2020-14360: Check SetMap request length carefully.
Backported from X.org:
From 446ff2d3177087b8173fa779fa5b77a2a128988b Mon Sep 17 00:00:00 2001
From: Matthieu Herrb <matthieu@herrb.eu>
Date: Thu, 12 Nov 2020 19:15:07 +0100
Subject: [PATCH] Check SetMap request length carefully.
Avoid out of bounds memory accesses on too short request.
ZDI-CAN 11572 / CVE-2020-14360
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Fixes ArcticaProject/nx-libs#972.
Diffstat (limited to 'nx-X11/programs/Xserver/hw/nxagent/NXshm.c')
0 files changed, 0 insertions, 0 deletions