mirror of
git://slackware.nl/current.git
synced 2025-02-01 19:57:45 +01:00
3dc2470097
extra/tigervnc/tigervnc-1.12.0-x86_64-4_slack15.0.txz: Rebuilt. Recompiled against xorg-server-1.20.14, including patches for several security issues. Thanks to marav. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-3550 https://www.cve.org/CVERecord?id=CVE-2022-3551 https://www.cve.org/CVERecord?id=CVE-2022-3553 https://www.cve.org/CVERecord?id=CVE-2022-4283 https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2023-0494 https://www.cve.org/CVERecord?id=CVE-2023-1393 https://www.cve.org/CVERecord?id=CVE-2023-5367 https://www.cve.org/CVERecord?id=CVE-2023-5380 (* Security fix *)
34 lines
1 KiB
Diff
34 lines
1 KiB
Diff
From 0ba6d8c37071131a49790243cdac55392ecf71ec Mon Sep 17 00:00:00 2001
|
|
From: Peter Hutterer <peter.hutterer@who-t.net>
|
|
Date: Wed, 25 Jan 2023 11:41:40 +1000
|
|
Subject: [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses
|
|
|
|
CVE-2023-0494, ZDI-CAN-19596
|
|
|
|
This vulnerability was discovered by:
|
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
|
|
|
Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
|
|
---
|
|
Xi/exevents.c | 4 +++-
|
|
1 file changed, 3 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/Xi/exevents.c b/Xi/exevents.c
|
|
index 217baa956..dcd4efb3b 100644
|
|
--- a/Xi/exevents.c
|
|
+++ b/Xi/exevents.c
|
|
@@ -619,8 +619,10 @@ DeepCopyPointerClasses(DeviceIntPtr from, DeviceIntPtr to)
|
|
memcpy(to->button->xkb_acts, from->button->xkb_acts,
|
|
sizeof(XkbAction));
|
|
}
|
|
- else
|
|
+ else {
|
|
free(to->button->xkb_acts);
|
|
+ to->button->xkb_acts = NULL;
|
|
+ }
|
|
|
|
memcpy(to->button->labels, from->button->labels,
|
|
from->button->numButtons * sizeof(Atom));
|
|
--
|
|
GitLab
|
|
|