Skip to content
Snippets Groups Projects
Commit d307040b authored by Mauro Matteo Cascella's avatar Mauro Matteo Cascella Committed by Gerd Hoffmann
Browse files

ui/vnc-clipboard: fix integer underflow in vnc_client_cut_text_ext


Extended ClientCutText messages start with a 4-byte header. If len < 4,
an integer underflow occurs in vnc_client_cut_text_ext. The result is
used to decompress data in a while loop in inflate_buffer, leading to
CPU consumption and denial of service. Prevent this by checking dlen in
protocol_client_msg.

Fixes: CVE-2022-3165
Fixes: 0bf41cab ("ui/vnc: clipboard support")
Reported-by: default avatarTangPeng <tangpeng@qianxin.com>
Signed-off-by: Mauro Matteo Cascella's avatarMauro Matteo Cascella <mcascell@redhat.com>
Message-Id: <20220925204511.1103214-1-mcascell@redhat.com>
Signed-off-by: Gerd Hoffmann's avatarGerd Hoffmann <kraxel@redhat.com>
parent b6d93282
No related branches found
No related tags found
No related merge requests found
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment