diff options
Diffstat (limited to 'net-libs/libvncserver/files/libvncserver-0.9.13-CVE-2020-29260.patch')
-rw-r--r-- | net-libs/libvncserver/files/libvncserver-0.9.13-CVE-2020-29260.patch | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/net-libs/libvncserver/files/libvncserver-0.9.13-CVE-2020-29260.patch b/net-libs/libvncserver/files/libvncserver-0.9.13-CVE-2020-29260.patch new file mode 100644 index 000000000000..23ffed8c1774 --- /dev/null +++ b/net-libs/libvncserver/files/libvncserver-0.9.13-CVE-2020-29260.patch @@ -0,0 +1,27 @@ +From bef41f6ec4097a8ee094f90a1b34a708fbd757ec Mon Sep 17 00:00:00 2001 +From: Christian Beier <info@christianbeier.net> +Date: Sat, 21 Nov 2020 12:52:31 +0100 +Subject: [PATCH] libvncclient: free vncRec memory in rfbClientCleanup() + +Otherwise we leak memory. Spotted by Ramin Farajpour Cami +<ramin.blackhat@gmail.com>, thanks! +--- + libvncclient/vncviewer.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/libvncclient/vncviewer.c b/libvncclient/vncviewer.c +index d6b91f02..0a1bdcf6 100644 +--- a/libvncclient/vncviewer.c ++++ b/libvncclient/vncviewer.c +@@ -534,6 +534,8 @@ void rfbClientCleanup(rfbClient* client) { + client->clientData = next; + } + ++ free(client->vncRec); ++ + if (client->sock != RFB_INVALID_SOCKET) + rfbCloseSocket(client->sock); + if (client->listenSock != RFB_INVALID_SOCKET) +-- +2.35.1 + |