Bug 1384510 - Memory corruption due to realloc on stack pointer
Summary: Memory corruption due to realloc on stack pointer
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: nss_ldap
Version: 5.11
Hardware: All
OS: Linux
medium
medium
Target Milestone: rc
: ---
Assignee: Nalin Dahyabhai
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-10-13 12:46 UTC by Paulo Andrade
Modified: 2019-12-16 07:05 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-04-18 21:57:08 UTC
Target Upstream Version:


Attachments (Terms of Use)
nss_ldap-253-sfdc01704512.patch (498 bytes, patch)
2016-10-13 12:46 UTC, Paulo Andrade
no flags Details | Diff

Description Paulo Andrade 2016-10-13 12:46:24 UTC
Created attachment 1210068 [details]
nss_ldap-253-sfdc01704512.patch

ldap-grp.c:do_parse_group_members() receives two
arguments to manage state of pointers:

o char ***pGroupMembers
o int *pGroupMembersBufferIsMalloced

and initially receives a stack pGroupMembers argument.
The problem happens because do_parse_group_members()
calls itself recursively, and does not update the
caller *pGroupMembers if the recursive call changed
it.

Comment 2 Chris Williams 2017-04-18 21:57:08 UTC
Red Hat Enterprise Linux 5 shipped it's last minor release, 5.11, on September 14th, 2014. On March 31st, 2017 RHEL 5 exited Production Phase 3 and entered Extended Life Phase. For RHEL releases in the Extended Life Phase, Red Hat  will provide limited ongoing technical support. No bug fixes, security fixes, hardware enablement or root-cause analysis will be available during this phase, and support will be provided on existing installations only.  If the customer purchases the Extended Life-cycle Support (ELS), certain critical-impact security fixes and selected urgent priority bug fixes for the last minor release will be provided.  For more details please consult the Red Hat Enterprise Linux Life Cycle Page:
https://access.redhat.com/support/policy/updates/errata

This BZ does not appear to meet ELS criteria so is being closed WONTFIX. If this BZ is critical for your environment and you have an Extended Life-cycle Support Add-on entitlement, please open a case in the Red Hat Customer Portal, https://access.redhat.com ,provide a thorough business justification and ask that the BZ be re-opened for consideration of an errata. Please note, only certain critical-impact security fixes and selected urgent priority bug fixes for the last minor release can be considered.


Note You need to log in before you can comment on or make changes to this bug.