Commit 78ed2333 authored by Julien Cristau's avatar Julien Cristau Committed by Ulrich Sibiller

xkb: fix off-by-one in _XkbReadGetNamesReply and _XkbReadVirtualModMap

The size of the arrays is max_key_code + 1. This makes these functions consistent with the other checks added for CVE-2013-1997. Also check the XkbGetNames reply when names->keys was just allocated. Signed-off-by: 's avatarJulien Cristau <jcristau@debian.org> Tested-by: 's avatarColin Walters <walters@verbum.org> Reviewed-by: 's avatarAlan Coopersmith <alan.coopersmith@oracle.com> Backported-to-NX-by: 's avatarUlrich Sibiller <uli42@gmx.de>
parent 082e8313
...@@ -427,7 +427,7 @@ XkbServerMapPtr srv; ...@@ -427,7 +427,7 @@ XkbServerMapPtr srv;
if ( rep->totalVModMapKeys>0 ) { if ( rep->totalVModMapKeys>0 ) {
if (((int) rep->firstVModMapKey + rep->nVModMapKeys) if (((int) rep->firstVModMapKey + rep->nVModMapKeys)
> xkb->max_key_code) > xkb->max_key_code + 1)
return BadLength; return BadLength;
if (((xkb->server==NULL)||(xkb->server->vmodmap==NULL))&& if (((xkb->server==NULL)||(xkb->server->vmodmap==NULL))&&
(XkbAllocServerMap(xkb,XkbVirtualModMapMask,0)!=Success)) { (XkbAllocServerMap(xkb,XkbVirtualModMapMask,0)!=Success)) {
......
...@@ -180,7 +180,7 @@ _XkbReadGetNamesReply( Display * dpy, ...@@ -180,7 +180,7 @@ _XkbReadGetNamesReply( Display * dpy,
nKeys= xkb->max_key_code+1; nKeys= xkb->max_key_code+1;
names->keys= _XkbTypedCalloc(nKeys,XkbKeyNameRec); names->keys= _XkbTypedCalloc(nKeys,XkbKeyNameRec);
} }
else if ( ((int)rep->firstKey + rep->nKeys) > xkb->max_key_code) if ( ((int)rep->firstKey + rep->nKeys) > xkb->max_key_code + 1)
goto BAILOUT; goto BAILOUT;
if (names->keys!=NULL) { if (names->keys!=NULL) {
if (!_XkbCopyFromReadBuffer(&buf, if (!_XkbCopyFromReadBuffer(&buf,
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment