This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/14547] strcoll integer / buffer overflow


https://sourceware.org/bugzilla/show_bug.cgi?id=14547

mancha <mancha1 at hush dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |mancha1 at hush dot com

--- Comment #8 from mancha <mancha1 at hush dot com> ---
Hello. I applied Siddhesh's three patches (2 CVE fixes + strcoll refactoring)
and the PoCs no longer trigger overflows.

What is a reasonable runtime to expect on those PoCs post-patch?

I ask because last night I left Joseph's code running on a ~2.3GHz Intel and it
was still going this morning [was in seq_next_seq_nocache()].

Thanks!

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]