Blame SOURCES/libvncserver-0.9.11-CVE-2019-20839.patch

217285
From 3fd03977c9b35800d73a865f167338cb4d05b0c1 Mon Sep 17 00:00:00 2001
217285
From: Christian Beier <dontmind@freeshell.org>
217285
Date: Sat, 6 Apr 2019 20:23:12 +0200
217285
Subject: [PATCH] libvncclient: bail out if unix socket name would overflow
217285
217285
Closes #291
217285
---
217285
 libvncclient/sockets.c | 4 ++++
217285
 1 file changed, 4 insertions(+)
217285
217285
diff --git a/libvncclient/sockets.c b/libvncclient/sockets.c
217285
index f042472f..821f85ca 100644
217285
--- a/libvncclient/sockets.c
217285
+++ b/libvncclient/sockets.c
217285
@@ -461,6 +461,10 @@ ConnectClientToUnixSock(const char *sockFile)
217285
   int sock;
217285
   struct sockaddr_un addr;
217285
   addr.sun_family = AF_UNIX;
217285
+  if(strlen(sockFile) + 1 > sizeof(addr.sun_path)) {
217285
+      rfbClientErr("ConnectToUnixSock: socket file name too long\n");
217285
+      return -1;
217285
+  }
217285
   strcpy(addr.sun_path, sockFile);
217285
 
217285
   sock = socket(AF_UNIX, SOCK_STREAM, 0);