]> git.ipfire.org Git - thirdparty/glibc.git/commit - NEWS
Check for integer overflow in cache size computation in strcoll
authorSiddhesh Poyarekar <siddhesh@redhat.com>
Mon, 23 Sep 2013 05:54:30 +0000 (11:24 +0530)
committerSiddhesh Poyarekar <siddhesh@redhat.com>
Mon, 23 Sep 2013 05:59:53 +0000 (11:29 +0530)
commit303e567a8062200dc06acde7c76fc34679f08d8f
tree8e0c198956de9addb51216c5cfccd47d7c4be69b
parent141f3a77fe4f1b59b0afa9bf6909cd2000448883
Check for integer overflow in cache size computation in strcoll

strcoll is implemented using a cache for indices and weights of
collation sequences in the strings so that subsequent passes do not
have to search through collation data again.  For very large string
inputs, the cache size computation could overflow.  In such a case,
use the fallback function that does not cache indices and weights of
collation sequences.

Fixes CVE-2012-4412.
ChangeLog
NEWS
string/Makefile
string/strcoll_l.c
string/tst-strcoll-overflow.c [new file with mode: 0644]