local-CVE-2024-2961-iso-2022-cn-ext
authorGNU Libc Maintainers <debian-glibc@lists.debian.org>
Tue, 30 Apr 2024 21:57:11 +0000 (23:57 +0200)
committerAurelien Jarno <aurel32@debian.org>
Tue, 30 Apr 2024 21:57:11 +0000 (23:57 +0200)
commitbf7efbc346587fdfe3b28da034e01f93b414c8b1
treed61cb7e0fe49e17feb12c587630cb51d1c08ed51
parent5297e42f118c0afe17f5a4a4f27853b0dbef3a7f
local-CVE-2024-2961-iso-2022-cn-ext

commit 3703c32a8d304c1ee12126134ce69be965f38000
Author: Charles Fol <folcharles@gmail.com>
Date:   Thu Mar 28 12:25:38 2024 -0300

    iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961)

    ISO-2022-CN-EXT uses escape sequences to indicate character set changes
    (as specified by RFC 1922).  While the SOdesignation has the expected
    bounds checks, neither SS2designation nor SS3designation have its;
    allowing a write overflow of 1, 2, or 3 bytes with fixed values:
    '$+I', '$+J', '$+K', '$+L', '$+M', or '$*H'.

    Checked on aarch64-linux-gnu.

Co-authored-by: Adhemerval Zanella <adhemerval.zanella@linaro.org>
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Tested-by: Carlos O'Donell <carlos@redhat.com>
    (cherry picked from commit f9dc609e06b1136bb0408be9605ce7973a767ada)

Gbp-Pq: Topic any
Gbp-Pq: Name local-CVE-2024-2961-iso-2022-cn-ext.patch
iconvdata/Makefile
iconvdata/iso-2022-cn-ext.c
iconvdata/tst-iconv-iso-2022-cn-ext.c [new file with mode: 0644]