• Shishir Jaiswal's avatar
    Bug#23498283 - BUFFER OVERFLOW · 957aefdc
    Shishir Jaiswal authored
    DESCRIPTION
    ===========
    Buffer overflow is reported in Regex library. This can be
    triggered when the data corresponding to argv[1] is >=
    512 bytes resutling in abnormal behaviour.
    
    ANALYSIS
    ========
    Its a straight forward case of SEGFAULT where the target
    buffer is smaller than the source string to be copied.
    A simple pre-copy validation should do.
    
    FIX
    ===
    A check is added before doing strcpy() to ensure that the
    target buffer is big enough to hold the to-be copied data.
    If the check fails, the program aborts.
    957aefdc
split.c 7.21 KB