Date: Sat, 14 Mar 2026 09:30:41 +0000 From: bugzilla-noreply@freebsd.org To: riscv@FreeBSD.org Subject: [Bug 293353] No overflow handling in the strnlen function Message-ID: <bug-293353-40250-OxxedcnNFZ@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-293353-40250@https.bugs.freebsd.org/bugzilla/>
index | next in thread | previous in thread | raw e-mail
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=293353 --- Comment #6 from commit-hook@FreeBSD.org --- A commit in branch stable/15 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=0536513edabc9ce3447738e986b0c9fff3907e64 commit 0536513edabc9ce3447738e986b0c9fff3907e64 Author: Strahinja Stanišić <strajabot@FreeBSD.org> AuthorDate: 2026-03-07 21:59:25 +0000 Commit: Robert Clausecker <fuz@FreeBSD.org> CommitDate: 2026-03-14 09:29:21 +0000 libc/riscv64: temporarily disable strnlen() implementation until a fix is developed strnlen() doesn't seem to cope well with a length argument such that string pointer plus length overflows past the end of the address space. Reviewed by: fuz MFC after: 1 week PR: 293353, 293296 Differential Revision: https://reviews.freebsd.org/D55714 (cherry picked from commit 2a4e3112c811b9892e14e15cfd23538e7e47329c) lib/libc/riscv/string/Makefile.inc | 1 - 1 file changed, 1 deletion(-) -- You are receiving this mail because: You are the assignee for the bug.home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-293353-40250-OxxedcnNFZ>
