gnu: xorg-server: Fix CVE-2017-{10971,10972}.
[jackhill/guix/guix.git] / gnu / packages / patches / xorg-server-CVE-2017-10972.patch
1 From 05442de962d3dc624f79fc1a00eca3ffc5489ced Mon Sep 17 00:00:00 2001
2 From: Michal Srb <msrb@suse.com>
3 Date: Wed, 24 May 2017 15:54:39 +0300
4 Subject: Xi: Zero target buffer in SProcXSendExtensionEvent.
5
6 Make sure that the xEvent eventT is initialized with zeros, the same way as
7 in SProcSendEvent.
8
9 Some event swapping functions do not overwrite all 32 bytes of xEvent
10 structure, for example XSecurityAuthorizationRevoked. Two cooperating
11 clients, one swapped and the other not, can send
12 XSecurityAuthorizationRevoked event to each other to retrieve old stack data
13 from X server. This can be potentialy misused to go around ASLR or
14 stack-protector.
15
16 Signed-off-by: Michal Srb <msrb@suse.com>
17 Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
18 Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
19
20 diff --git a/Xi/sendexev.c b/Xi/sendexev.c
21 index 11d8202..1cf118a 100644
22 --- a/Xi/sendexev.c
23 +++ b/Xi/sendexev.c
24 @@ -78,7 +78,7 @@ SProcXSendExtensionEvent(ClientPtr client)
25 {
26 CARD32 *p;
27 int i;
28 - xEvent eventT;
29 + xEvent eventT = { .u.u.type = 0 };
30 xEvent *eventP;
31 EventSwapPtr proc;
32
33 --
34 cgit v0.10.2
35