diff options
author | Peter Hutterer <peter.hutterer@who-t.net> | 2023-01-25 11:41:40 +1000 |
---|---|---|
committer | Olivier Fourdan <ofourdan@redhat.com> | 2023-02-07 08:30:43 +0100 |
commit | 8660dd164882ce5fc1f274427e2ff3dc020d6273 (patch) | |
tree | 368703fae11b824ca60bd5d03aa8f3c116b2b13f | |
parent | 8e3926281fb4e42655a4e32dac814a3de193cef7 (diff) |
Xi: fix potential use-after-free in DeepCopyPointerClasses
CVE-2023-0494, ZDI-CAN-19596
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
(cherry picked from commit 0ba6d8c37071131a49790243cdac55392ecf71ec)
-rw-r--r-- | Xi/exevents.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/Xi/exevents.c b/Xi/exevents.c index 217baa956..dcd4efb3b 100644 --- a/Xi/exevents.c +++ b/Xi/exevents.c @@ -619,8 +619,10 @@ DeepCopyPointerClasses(DeviceIntPtr from, DeviceIntPtr to) memcpy(to->button->xkb_acts, from->button->xkb_acts, sizeof(XkbAction)); } - else + else { free(to->button->xkb_acts); + to->button->xkb_acts = NULL; + } memcpy(to->button->labels, from->button->labels, from->button->numButtons * sizeof(Atom)); |