The Samba-Bugzilla – Attachment 16585 Details for
Bug 14684
buffer overruns in talloc_string_sub2() due to false strstr_m matches
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
the crash test reduced to short mostly printable strings
crash_talloc_string_sub2.c (text/plain), 439 bytes, created by
Douglas Bagnall
on 2021-04-08 05:13:38 UTC
(
hide
)
Description:
the crash test reduced to short mostly printable strings
Filename:
MIME Type:
Creator:
Douglas Bagnall
Created:
2021-04-08 05:13:38 UTC
Size:
439 bytes
patch
obsolete
>#include "includes.h" > >const char string[] = "++++++\xD8\xBB"; >const char pattern[] = "++++\xF0\x80\x80\x80+++++"; >const char replace[] = "......................"; > >int main(int argc, char *argv[]) >{ > char *t = NULL; > printf("%s\n %zu\n", string, strlen(string)); > printf("%s\n %zu\n", pattern, strlen(pattern)); > > t = talloc_string_sub(NULL, string, pattern, replace); > > printf("%s\n %zu\n", t, strlen(t)); > talloc_free(t); > return 0; >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 14684
:
16580
|
16581
|
16582
|
16583
|
16584
| 16585 |
16586
|
16655
|
16656