Fix XChangeFeedbackControl() request underflow
CVE-2021-3472 / ZDI-CAN-1259 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
This commit is contained in:
		
							parent
							
								
									66ce61983d
								
							
						
					
					
						commit
						7aaf54a188
					
				| 
						 | 
				
			
			@ -464,8 +464,11 @@ ProcXChangeFeedbackControl(ClientPtr client)
 | 
			
		|||
        break;
 | 
			
		||||
    case StringFeedbackClass:
 | 
			
		||||
    {
 | 
			
		||||
        xStringFeedbackCtl *f = ((xStringFeedbackCtl *) &stuff[1]);
 | 
			
		||||
        xStringFeedbackCtl *f;
 | 
			
		||||
 | 
			
		||||
        REQUEST_AT_LEAST_EXTRA_SIZE(xChangeFeedbackControlReq,
 | 
			
		||||
                                    sizeof(xStringFeedbackCtl));
 | 
			
		||||
        f = ((xStringFeedbackCtl *) &stuff[1]);
 | 
			
		||||
        if (client->swapped) {
 | 
			
		||||
            if (len < bytes_to_int32(sizeof(xStringFeedbackCtl)))
 | 
			
		||||
                return BadLength;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue