summaryrefslogtreecommitdiffstats
path: root/source/x/xorg-server-xwayland/CVE-2022-3550.patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-10-20 18:39:03 +0000
committer Eric Hameleers <alien@slackware.com>2022-10-21 07:00:16 +0200
commitcc9100112bedc83ea2109a4b2aa9ae50b5a97b13 (patch)
treeea54e7d436aa7fc8859fc837cb49d290ee516985 /source/x/xorg-server-xwayland/CVE-2022-3550.patch
parent6df89862412c0813623a7e91954f596958bd9537 (diff)
downloadcurrent-cc9100112bedc83ea2109a4b2aa9ae50b5a97b13.tar.gz
current-cc9100112bedc83ea2109a4b2aa9ae50b5a97b13.tar.xz
Thu Oct 20 18:39:03 UTC 202220221020183903
l/harfbuzz-5.3.1-x86_64-1.txz: Upgraded. l/qca-2.3.5-x86_64-1.txz: Upgraded. x/mesa-22.2.2-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-22.1.4-x86_64-1.txz: Upgraded. xap/mozilla-firefox-106.0.1-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/firefox/106.0.1/releasenotes/ xap/mozilla-thunderbird-102.4.0-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.4.0/releasenotes/
Diffstat (limited to 'source/x/xorg-server-xwayland/CVE-2022-3550.patch')
-rw-r--r--source/x/xorg-server-xwayland/CVE-2022-3550.patch34
1 files changed, 0 insertions, 34 deletions
diff --git a/source/x/xorg-server-xwayland/CVE-2022-3550.patch b/source/x/xorg-server-xwayland/CVE-2022-3550.patch
deleted file mode 100644
index 3461b0749..000000000
--- a/source/x/xorg-server-xwayland/CVE-2022-3550.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 11beef0b7f1ed290348e45618e5fa0d2bffcb72e Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter.hutterer@who-t.net>
-Date: Tue, 5 Jul 2022 12:06:20 +1000
-Subject: xkb: proof GetCountedString against request length attacks
-
-GetCountedString did a check for the whole string to be within the
-request buffer but not for the initial 2 bytes that contain the length
-field. A swapped client could send a malformed request to trigger a
-swaps() on those bytes, writing into random memory.
-
-Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
----
- xkb/xkb.c | 5 +++++
- 1 file changed, 5 insertions(+)
-
-diff --git a/xkb/xkb.c b/xkb/xkb.c
-index f42f59ef3..1841cff26 100644
---- a/xkb/xkb.c
-+++ b/xkb/xkb.c
-@@ -5137,6 +5137,11 @@ _GetCountedString(char **wire_inout, ClientPtr client, char **str)
- CARD16 len;
-
- wire = *wire_inout;
-+
-+ if (client->req_len <
-+ bytes_to_int32(wire + 2 - (char *) client->requestBuffer))
-+ return BadValue;
-+
- len = *(CARD16 *) wire;
- if (client->swapped) {
- swaps(&len);
---
-cgit v1.2.1
-