aboutsummaryrefslogtreecommitdiff
path: root/nx-X11/programs/Xserver/hw/nxagent/NXshm.c
diff options
context:
space:
mode:
authorMike Gabriel <mike.gabriel@das-netzwerkteam.de>2020-12-10 10:24:29 +0100
committerMike Gabriel <mike.gabriel@das-netzwerkteam.de>2020-12-10 10:30:06 +0100
commitd5a3b440130257e08f7e507eae711885b4f4db50 (patch)
treee2bc33ba6e01d03e3733d83843f62b5c15e1943c /nx-X11/programs/Xserver/hw/nxagent/NXshm.c
parentad275d50720fbbaf65bc0668eed0297df5d27cad (diff)
downloadnx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.tar.gz
nx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.tar.bz2
nx-libs-d5a3b440130257e08f7e507eae711885b4f4db50.zip
CVE-2020-14360: Check SetMap request length carefully.
Backported from X.org: From 446ff2d3177087b8173fa779fa5b77a2a128988b Mon Sep 17 00:00:00 2001 From: Matthieu Herrb <matthieu@herrb.eu> Date: Thu, 12 Nov 2020 19:15:07 +0100 Subject: [PATCH] Check SetMap request length carefully. Avoid out of bounds memory accesses on too short request. ZDI-CAN 11572 / CVE-2020-14360 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Fixes ArcticaProject/nx-libs#972.
Diffstat (limited to 'nx-X11/programs/Xserver/hw/nxagent/NXshm.c')
0 files changed, 0 insertions, 0 deletions