This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/17715] Robustify TZ file parser and reduce attack surface
- From: "fweimer at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Tue, 16 Dec 2014 10:38:46 +0000
- Subject: [Bug libc/17715] Robustify TZ file parser and reduce attack surface
- Auto-submitted: auto-generated
- References: <bug-17715-131 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17715
--- Comment #4 from Florian Weimer <fweimer at redhat dot com> ---
The issue appears to be related to lack of checking of num_isstd, num_isgmt in
__tzfile_read. The code is difficult to review, and this code may have other
issues.
There is also an unbounded alloca further down (in the sizeof (time_t) == 4
case), which also needs to be changed.
--
You are receiving this mail because:
You are on the CC list for the bug.