CVSROOT:        /cvs
Module name:    xenocara
Changes by:     matth...@cvs.openbsd.org        2016/10/04 09:09:40

Modified files:
        lib/libXv/src  : Xv.c 

Log message:
Protocol handling issues in libXv

The Xv query functions for adaptors and encodings suffer from out of boundary
accesses if a hostile X server sends a maliciously crafted response.

A previous fix already checks the received length against fixed values but
ignores additional length specifications which are stored inside the received
data.

These lengths are accessed in a for-loop. The easiest way to guarantee a
correct processing is by validating all lengths against the remaining size
left before accessing referenced memory.

This makes the previously applied check obsolete, therefore I removed it.

>From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016

Reply via email to