From 303e567a8062200dc06acde7c76fc34679f08d8f Mon Sep 17 00:00:00 2001 From: Siddhesh Poyarekar Date: Mon, 23 Sep 2013 11:24:30 +0530 Subject: Check for integer overflow in cache size computation in strcoll strcoll is implemented using a cache for indices and weights of collation sequences in the strings so that subsequent passes do not have to search through collation data again. For very large string inputs, the cache size computation could overflow. In such a case, use the fallback function that does not cache indices and weights of collation sequences. Fixes CVE-2012-4412. --- string/Makefile | 2 ++ 1 file changed, 2 insertions(+) (limited to 'string/Makefile') diff --git a/string/Makefile b/string/Makefile index 7362828..c2c7d37 100644 --- a/string/Makefile +++ b/string/Makefile @@ -57,6 +57,8 @@ tests := tester inl-tester noinl-tester testcopy test-ffs \ tests-ifunc := $(strop-tests:%=test-%-ifunc) tests += $(tests-ifunc) +xtests = tst-strcoll-overflow + include ../Rules tester-ENV = LANGUAGE=C -- cgit v1.1