-
Notifications
You must be signed in to change notification settings - Fork 315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Out of bounds read in mbc_to_code() #16
Labels
Comments
kkos
added a commit
that referenced
this issue
Aug 21, 2016
Thank you for the report. |
This fix also seems incomplete. Passing bytes 0xfb, 0x0a still triggers an out of bounds in the same code line:
|
kkos
pushed a commit
that referenced
this issue
Aug 24, 2016
Thanks again. |
staabm
referenced
this issue
in php/php-src
Sep 2, 2016
Merge upstream patch from kkos/oniguruma@65bdf2a
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
For certain inputs to the regular expression parser via onig_new() an out of bounds read access will happen. This can be seen by compiling oniguruma with address sanitizer (-fsanitize=address). See code example below.
I found this bug while fuzzing PHP with american fuzzy lop, yet it seems the bug is not in PHP itself, but in it's bundled oniguruma copy. Tested both with the git code and version 5.9.5.
The Address Sanitizer stack trace:
The text was updated successfully, but these errors were encountered: