0f23ab8aac
The bug is an out-of-bounds read detected with address sanitizer that happens when 'sp' in p_b_coll_elems() includes NUL byte[s], e.g. if it's equal to "GS\x00". In that case len will be equal to 4, and the strncmp(cp->name, sp, len) call will succeed when cp->name is "GS" but the cp->name[len] == '\0' comparison will cause the read to go out-of-bounds. Checking the length using strlen() instead eliminates the issue. The bug was found in LLVM with oss-fuzz: https://reviews.llvm.org/D39380 MFC after: 1 week Obtained from: Vlad Tsyrklevich through posting on openbsd-tech |
||
---|---|---|
.. | ||
grot | ||
cname.h | ||
COPYRIGHT | ||
engine.c | ||
Makefile.inc | ||
re_format.7 | ||
regcomp.c | ||
regerror.c | ||
regex2.h | ||
regex.3 | ||
regexec.c | ||
regfree.c | ||
Symbol.map | ||
utils.h | ||
WHATSNEW |