Bugzilla – Bug 779325
VUL-1: glibc: buffer overflow in strcoll / alloca
Last modified: 2015-01-20 10:24:04 UTC
is public via oss-sec From: Jan Lieskovsky <jlieskov@redhat.com> Subject: [oss-security] CVE Request -- glibc: strcoll() integer overflow leading to buffer overflow + another alloca() stack overflow issue (upstream #14547 && #14552) (first issue is in other bug) 2) Issue #2 (mentioned here only for completeness, but I am not of the opinion this should receive a CVE identifier. See argumentation below [but open to glibc upstream / others to disprove it]). alloca() stack overflow (first issue from the report below) Upstream bug report: [3] http://sourceware.org/bugzilla/show_bug.cgi?id=14552 If I have looked correctly this is expected / known behaviour of alloca() - from the manual page: [4] http://linux.die.net/man/3/alloca "Return Value The alloca() function returns a pointer to the beginning of the allocated space. If the allocation causes stack overflow, program behavior is undefined." Under my opinion the above description covers also the case of 'alloca() stack overflow' as reported in bug [3]. Further opinions / upstream comments appreciated though.
bugbot adjusting priority
Assigned CVE-2012-4424, meanwhile.
To document it more explicitly: The upstream reports can be found here: 1) http://sourceware.org/bugzilla/show_bug.cgi?id=14552 and 2) http://sourceware.org/bugzilla/show_bug.cgi?id=14547
Is it feasible to fix this in the running update or should we postpone it to the next one? I.e. is the problem fixed upstream already?
There is no fix available yet.
I suppose there's no fix for this one upstream yet?
Still no upstream fix?
See #779320.
OK, this was already too long tracked twice. Resolving as duplicate. *** This bug has been marked as a duplicate of bug 779320 ***