]> git.ipfire.org Git - thirdparty/glibc.git/commit
Check for integer overflow in cache size computation in strcoll
authorSiddhesh Poyarekar <siddhesh@redhat.com>
Mon, 23 Sep 2013 05:54:30 +0000 (11:24 +0530)
committerAdhemerval Zanella <azanella@linux.vnet.ibm.com>
Thu, 15 Jan 2015 19:53:21 +0000 (14:53 -0500)
commita243b1a0797180e142d525d1325a173c758c3714
treec6ec12ec630b7a81c7403ad1c504b6037bf82158
parentc1132021659d22753104762a074d6339ae6cbd01
Check for integer overflow in cache size computation in strcoll

strcoll is implemented using a cache for indices and weights of
collation sequences in the strings so that subsequent passes do not
have to search through collation data again.  For very large string
inputs, the cache size computation could overflow.  In such a case,
use the fallback function that does not cache indices and weights of
collation sequences.

Fixes CVE-2012-4412.
ChangeLog
NEWS
string/Makefile
string/strcoll_l.c
string/tst-strcoll-overflow.c [new file with mode: 0644]