diff options
author | Rich Felker <dalias@aerifal.cx> | 2017-03-14 14:18:07 -0400 |
---|---|---|
committer | Rich Felker <dalias@aerifal.cx> | 2017-03-14 14:18:07 -0400 |
commit | 6582baa752a8facb2c8a7b5b3dcf67331429cdc1 (patch) | |
tree | 802e86d8e31c86bc924b20084144ec34a4438629 /src/ctype/iswblank.c | |
parent | 6476b8135760659b25c93ff9308425ca98a9e777 (diff) | |
download | musl-6582baa752a8facb2c8a7b5b3dcf67331429cdc1.tar.gz |
fix free of uninitialized buffer pointer on error in regexec
the fix in commit c3edc06d1e1360f3570db9155d6b318ae0d0f0f7 for
CVE-2016-8859 used gotos to exit on overflow conditions, but the code
in that error path assumed the buffer pointer was valid or null. thus,
the conditions which previously led to under-allocation and buffer
overflow could instead lead to an invalid pointer being passed to
free.
Diffstat (limited to 'src/ctype/iswblank.c')
0 files changed, 0 insertions, 0 deletions