Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Mar 2026 09:30:41 +0000
From:      bugzilla-noreply@freebsd.org
To:        riscv@FreeBSD.org
Subject:   [Bug 293353] No overflow handling in the strnlen function
Message-ID:  <bug-293353-40250-OxxedcnNFZ@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-293353-40250@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=293353

--- Comment #6 from commit-hook@FreeBSD.org ---
A commit in branch stable/15 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=0536513edabc9ce3447738e986b0c9fff3907e64

commit 0536513edabc9ce3447738e986b0c9fff3907e64
Author:     Strahinja Stanišić <strajabot@FreeBSD.org>
AuthorDate: 2026-03-07 21:59:25 +0000
Commit:     Robert Clausecker <fuz@FreeBSD.org>
CommitDate: 2026-03-14 09:29:21 +0000

    libc/riscv64: temporarily disable strnlen() implementation until a fix is
developed

    strnlen() doesn't seem to cope well with a length argument such that
    string pointer plus length overflows past the end of the address space.

    Reviewed by:    fuz
    MFC after:      1 week
    PR:             293353, 293296
    Differential Revision:  https://reviews.freebsd.org/D55714

    (cherry picked from commit 2a4e3112c811b9892e14e15cfd23538e7e47329c)

 lib/libc/riscv/string/Makefile.inc | 1 -
 1 file changed, 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-293353-40250-OxxedcnNFZ>