[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request: glibc: potential application crash due to overread in fnmatch
From:       Florian Weimer <fweimer () redhat ! com>
Date:       2015-02-26 15:21:43
Message-ID: 54EF3A07.20401 () redhat ! com
[Download RAW message or body]

When processing certain malformed patterns, fnmatch can skip over the
NUL byte terminating the pattern.  This can potentially result in an
application crash if fnmatch hits an unmapped page before encountering a
NUL byte.

Upstream bug report:

  https://sourceware.org/bugzilla/show_bug.cgi?id=18032

The fix is here:


https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185

It will go into glibc 2.22.

-- 
Florian Weimer / Red Hat Product Security
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic