-
- Downloads
ui/vnc-clipboard: fix integer underflow in vnc_client_cut_text_ext
Extended ClientCutText messages start with a 4-byte header. If len < 4, an integer underflow occurs in vnc_client_cut_text_ext. The result is used to decompress data in a while loop in inflate_buffer, leading to CPU consumption and denial of service. Prevent this by checking dlen in protocol_client_msg. Fixes: CVE-2022-3165 Fixes: 0bf41cab ("ui/vnc: clipboard support") Reported-by:TangPeng <tangpeng@qianxin.com> Signed-off-by:
Mauro Matteo Cascella <mcascell@redhat.com> Message-Id: <20220925204511.1103214-1-mcascell@redhat.com> Signed-off-by:
Gerd Hoffmann <kraxel@redhat.com>
Loading
-
mentioned in commit openembedded/openembedded-core@c7eb6da6
-
mentioned in commit raspet/yocto/poky@52e9ab5d
Please register or sign in to comment