Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Jan 2013 06:40:30 -0500 (EST)
From: Jan Lieskovsky <>
Cc: "Steven M. Christey" <>, Jeff Law <>,
        Paolo Bonzini <>,
        Florian Weimer <>
Subject: CVE Request -- glibc: DoS due to a buffer overrun in regexp matcher
 by processing multibyte characters

Hello Kurt, Steve, vendors,

  a security flaw was found in the regular expression matching
routine of glibc, the GNU libc libraries, processed multibyte
characters input. If an application utilized the glibc's regular
expression matching mechanism, an attacker could provide
a specially-crafted input that, when processed would lead
to that executable crash.

Upstream bug report:

Relevant patch:

More background:
* (from Paolo): Jan 30 11:34:19 <bonzini> iankko: it is a memset(foo, 0, ...) that
 overruns the buffer, so it's not controllable by the attacker

* but the denial of service scenario / attack vector is valid (consider network
facing application using glibc's regexp matching on untrusted input)

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.