]> git.ipfire.org Git - thirdparty/glibc.git/commit
Check for integer overflow in cache size computation in strcoll
authorSiddhesh Poyarekar <siddhesh@redhat.com>
Mon, 23 Sep 2013 05:54:30 +0000 (11:24 +0530)
committerAdhemerval Zanella <azanella@linux.vnet.ibm.com>
Fri, 15 Nov 2013 17:42:10 +0000 (11:42 -0600)
commit4415a70617fdc4a47a6302f69b943c9c51ae8cac
tree120fe3e52643bc65c5c04f2c5cf0ff2befdd22b1
parent5326e2c77bbd559fec9dc50e6d250eb0ce6a8d8c
Check for integer overflow in cache size computation in strcoll

strcoll is implemented using a cache for indices and weights of
collation sequences in the strings so that subsequent passes do not
have to search through collation data again.  For very large string
inputs, the cache size computation could overflow.  In such a case,
use the fallback function that does not cache indices and weights of
collation sequences.

Fixes CVE-2012-4412.
ChangeLog
NEWS
string/Makefile
string/strcoll_l.c
string/tst-strcoll-overflow.c [new file with mode: 0644]