* gnu/packages/patches/xorg-server-CVE-2017-10971.patch, gnu/packages/patches/xorg-server-CVE-2017-10972.patch: New files. * gnu/local.mk (dist_patch_DATA): Add them. * gnu/packages/xorg.scm (xorg-server)[source]: Use them. Signed-off-by: Leo Famulari <leo@famulari.name>
		
			
				
	
	
		
			35 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			35 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| From 05442de962d3dc624f79fc1a00eca3ffc5489ced Mon Sep 17 00:00:00 2001
 | |
| From: Michal Srb <msrb@suse.com>
 | |
| Date: Wed, 24 May 2017 15:54:39 +0300
 | |
| Subject: Xi: Zero target buffer in SProcXSendExtensionEvent.
 | |
| 
 | |
| Make sure that the xEvent eventT is initialized with zeros, the same way as
 | |
| in SProcSendEvent.
 | |
| 
 | |
| Some event swapping functions do not overwrite all 32 bytes of xEvent
 | |
| structure, for example XSecurityAuthorizationRevoked. Two cooperating
 | |
| clients, one swapped and the other not, can send
 | |
| XSecurityAuthorizationRevoked event to each other to retrieve old stack data
 | |
| from X server. This can be potentialy misused to go around ASLR or
 | |
| stack-protector.
 | |
| 
 | |
| Signed-off-by: Michal Srb <msrb@suse.com>
 | |
| Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
 | |
| Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
 | |
| 
 | |
| diff --git a/Xi/sendexev.c b/Xi/sendexev.c
 | |
| index 11d8202..1cf118a 100644
 | |
| --- a/Xi/sendexev.c
 | |
| +++ b/Xi/sendexev.c
 | |
| @@ -78,7 +78,7 @@ SProcXSendExtensionEvent(ClientPtr client)
 | |
|  {
 | |
|      CARD32 *p;
 | |
|      int i;
 | |
| -    xEvent eventT;
 | |
| +    xEvent eventT = { .u.u.type = 0 };
 | |
|      xEvent *eventP;
 | |
|      EventSwapPtr proc;
 | |
|  
 | |
| -- 
 | |
| cgit v0.10.2
 | |
| 
 |