|
Message-ID: <4EE2338C.5080505@redhat.com> Date: Fri, 09 Dec 2011 09:13:00 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Ludwig Nussel <ludwig.nussel@...e.de> Subject: Re: CVE Request: icu out of bounds access -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/09/2011 01:31 AM, Ludwig Nussel wrote: > Hi, > > An of bounds access was reported in icu: > http://bugs.icu-project.org/trac/ticket/8984 > > Unfortunately the chrome bug is private but the commit says "buffer > overflow": > http://codereview.chromium.org/8822005/patch/6001/7002 > > I suppose a negative len could end up in the strncpy at the end of the > function causing a buffer overflow. > > cu > Ludwig > Please use CVE-2011-4599 for this issue. - -- - -Kurt Seifried / Red Hat Security Response Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iQIcBAEBAgAGBQJO4jOMAAoJEBYNRVNeJnmTQSQP/1xlN0UhL6VLlXoA4crkUluR URvaK/ZD9GYB9T/cX7gGzemhKjTeEQquKR9lA9nn1CTKowrqtG1//l9TKHJ53vjw d4IQKrjf8pIv9IZeWMT1hIpT+8o63od1mMXtqAME05T5pCxALC8/YbMa5zTZNyYc mGrlhk1uUeldVnKEXslbjk03pbp1T4ybV7oq8k3G59kwz0xaAz1LGuKP05aTXf7a h4Qr0ct+Dsczw/544Gnjx91SsM7p7nEfRT5eKppqCVXMpDxpMbT6KXJh9Nj42Vkz GJRtVtvygeapAoES6d/OuCWYmTf7X/H85Gu1042DINRYaDdjfTucDD1GMN8W/ZZD ThryHpkcef32xc+ZGQF7MLF07CnSu+mcH/Ed8yBqPEfE1V0l6+p9crWAEJm+/Blz 5Z7kUCH93mSjnV0tGNl7FJ8luSZEpDNrnrJ4rT0N0npv2s9JvUXP72odrzhOGg3i 3E2yw2/DRNyItsPlS2PtlJHu53YZhz2rKbu9LBXepD7FsOOyDZJL+O7Uu9XT383P 8ZBou0VCI6Lcw+zBMtAdpOCeWVRkgfjZ+n5LrhWFtJfH4bYwgUCkh8koSMdMTVsz bdbm+9XSj+m03X/otk3URNUa2tcCfGPZVbS/2yM3+EgDsB4xPXeXvXTEwZWQHKsS hNEOOLNnDRzndZWa1qV3 =V1JK -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.