Blame SOURCES/libvncserver-0.9.11-CVE-2019-20839.patch

07ca88
From 3fd03977c9b35800d73a865f167338cb4d05b0c1 Mon Sep 17 00:00:00 2001
07ca88
From: Christian Beier <dontmind@freeshell.org>
07ca88
Date: Sat, 6 Apr 2019 20:23:12 +0200
07ca88
Subject: [PATCH] libvncclient: bail out if unix socket name would overflow
07ca88
07ca88
Closes #291
07ca88
---
07ca88
 libvncclient/sockets.c | 4 ++++
07ca88
 1 file changed, 4 insertions(+)
07ca88
07ca88
diff --git a/libvncclient/sockets.c b/libvncclient/sockets.c
07ca88
index f042472f..821f85ca 100644
07ca88
--- a/libvncclient/sockets.c
07ca88
+++ b/libvncclient/sockets.c
07ca88
@@ -461,6 +461,10 @@ ConnectClientToUnixSock(const char *sockFile)
07ca88
   int sock;
07ca88
   struct sockaddr_un addr;
07ca88
   addr.sun_family = AF_UNIX;
07ca88
+  if(strlen(sockFile) + 1 > sizeof(addr.sun_path)) {
07ca88
+      rfbClientErr("ConnectToUnixSock: socket file name too long\n");
07ca88
+      return -1;
07ca88
+  }
07ca88
   strcpy(addr.sun_path, sockFile);
07ca88
 
07ca88
   sock = socket(AF_UNIX, SOCK_STREAM, 0);