Bug 765812 (CVE-2011-4599)
Summary: | CVE-2011-4599 icu: Stack-based buffer overflow by canonicalizing the given localeID | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | caolanm, erack, rajasekhar.maddala, sarjutambe, security-response-team, srl, vdanen | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2012-08-02 05:03:47 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 766537, 766538, 766539, 766540, 766542, 833912 | ||||||
Bug Blocks: | 765833 | ||||||
Attachments: |
|
Description
Jan Lieskovsky
2011-12-09 14:08:09 UTC
This issue was assigned the name CVE-2011-4599: http://seclists.org/oss-sec/2011/q4/490 This issue affects the version of icu as shipped with Red Hat Enterprise Linux 5 and 6. This issue affects the version of icu as shipped with Fedora release 15 and 16. Created attachment 545647 [details]
stashing RHEL-5 backport of equivalent fix
Created icu tracking bugs for this issue Affects: fedora-all [bug 766542] This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2011:1815 https://rhn.redhat.com/errata/RHSA-2011-1815.html check this issues is there any test case for this issues? for this issues is there any test case? The only information available is http://bugs.icu-project.org/trac/ticket/8984 and the patch attached there http://bugs.icu-project.org/trac/attachment/ticket/8984/canonicalize2.patch and the code mentioned http://bugs.icu-project.org/trac/browser/icu/trunk/source/common/uloc.cpp#L1808 From the code it looks like one would have to pass an oversized locale string with a variant set (that if stripped either leaves an empty or still oversized string) to the internal _canonicalize() function with a _ULOC_CANONICALIZE option set. Is there any existing ICU test sample to verify this fix? |