Skip to content
Snippets Groups Projects
Commit 6907b6ea authored by Peter Hutterer's avatar Peter Hutterer Committed by Povilas Kanapickas
Browse files

xkb: add request length validation for XkbSetGeometry


No validation of the various fields on that report were done, so a
malicious client could send a short request that claims it had N
sections, or rows, or keys, and the server would process the request for
N sections, running out of bounds of the actual request data.

Fix this by adding size checks to ensure our data is valid.

ZDI-CAN 16062, CVE-2022-2319.

This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative

Signed-off-by: default avatarPeter Hutterer <peter.hutterer@who-t.net>
parent dd8caf39
No related branches found
No related tags found
No related merge requests found
Pipeline #799297 failed