slackware-current/source/x/x11/patch/xorg-server/xorg-server.CVE-2021-4011.e56f61c79fc3cee26d83cda0f84ae56d5979f768.patch
Patrick J Volkerding dd0455444d Wed Dec 15 04:34:02 UTC 2021
a/dialog-1.3_20211214-x86_64-1.txz:  Upgraded.
a/kernel-generic-5.15.8-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.15.8-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.15.8-x86_64-1.txz:  Upgraded.
a/sysvinit-3.01-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.15.8-x86-1.txz:  Upgraded.
d/patchelf-0.14.3-x86_64-1.txz:  Upgraded.
k/kernel-source-5.15.8-noarch-1.txz:  Upgraded.
l/oniguruma-6.9.7.1-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.41-x86_64-1.txz:  Upgraded.
x/libinput-1.19.3-x86_64-1.txz:  Upgraded.
x/xorg-server-1.20.13-x86_64-2.txz:  Rebuilt.
  Fixes for multiple input validation failures in X server extensions:
  render: Fix out of bounds access in SProcRenderCompositeGlyphs()
  xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
  Xext: Fix out of bounds access in SProcScreenSaverSuspend()
  record: Fix out of bounds access in SwapCreateRegister()
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
  (* Security fix *)
x/xorg-server-xephyr-1.20.13-x86_64-2.txz:  Rebuilt.
x/xorg-server-xnest-1.20.13-x86_64-2.txz:  Rebuilt.
x/xorg-server-xvfb-1.20.13-x86_64-2.txz:  Rebuilt.
x/xorg-server-xwayland-21.1.4-x86_64-1.txz:  Upgraded.
  Fixes for multiple input validation failures in X server extensions:
  render: Fix out of bounds access in SProcRenderCompositeGlyphs()
  xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
  Xext: Fix out of bounds access in SProcScreenSaverSuspend()
  record: Fix out of bounds access in SwapCreateRegister()
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
  (* Security fix *)
xap/xsnow-3.4.1-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2021-12-15 08:59:46 +01:00

33 lines
1.1 KiB
Diff

From e56f61c79fc3cee26d83cda0f84ae56d5979f768 Mon Sep 17 00:00:00 2001
From: Povilas Kanapickas <povilas@radix.lt>
Date: Tue, 14 Dec 2021 15:00:00 +0200
Subject: [PATCH] record: Fix out of bounds access in SwapCreateRegister()
ZDI-CAN-14952, CVE-2021-4011
This vulnerability was discovered and the fix was suggested by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Povilas Kanapickas <povilas@radix.lt>
---
record/record.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/record/record.c b/record/record.c
index be154525d..e123867a7 100644
--- a/record/record.c
+++ b/record/record.c
@@ -2516,8 +2516,8 @@ SwapCreateRegister(ClientPtr client, xRecordRegisterClientsReq * stuff)
swapl(pClientID);
}
if (stuff->nRanges >
- client->req_len - bytes_to_int32(sz_xRecordRegisterClientsReq)
- - stuff->nClients)
+ (client->req_len - bytes_to_int32(sz_xRecordRegisterClientsReq)
+ - stuff->nClients) / bytes_to_int32(sz_xRecordRange))
return BadLength;
RecordSwapRanges((xRecordRange *) pClientID, stuff->nRanges);
return Success;
--
GitLab