This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug string/21014] New: i686 memchr overflows internal pointer check


https://sourceware.org/bugzilla/show_bug.cgi?id=21014

            Bug ID: 21014
           Summary: i686 memchr overflows internal pointer check
           Product: glibc
           Version: 2.14
            Status: NEW
          Severity: normal
          Priority: P2
         Component: string
          Assignee: unassigned at sourceware dot org
          Reporter: adhemerval.zanella at linaro dot org
  Target Milestone: ---

Similar to BZ#19387 and BZ#20971, both i686 memchr optimized assembly
implementations [1] [2] do not handle the size overflow correctly.

This is shown by the new tests added by commit 3daef2c8ee4df29, where both
implementation fails with size as SIZE_MAX.

[1] sysdeps/i386/i686/multiarch/memchr-sse2-bsf.S
[2] sysdeps/i386/i686/multiarch/memchr-sse2.S

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]