Hello GNU m4 Maintainer,

I would like to report a potential security issue in m4 1.4.21.

The issue is in the format builtin path. User-controlled width and precision values are forwarded into xasprintf in src/format.c:

```c
str = xasprintf (fstart, width, prec, ARG_INT (argc, argv));
```

That eventually reaches lib/xvasprintf.c, where a failure path prints an error and aborts:

```c
fprintf (stderr, "vasprintf failed! format=\"%s\", errno=%s\n",
         format, errname);
abort ();
```

Passing INT_MIN as a width can trigger an EOVERFLOW path and terminate the process.

Affected area:
- src/format.c:246-270
- src/format.c:365-367
- lib/xvasprintf.c:97-127

If useful, I can provide a minimal PoC and reproduction output.

If you believe this is a valid security issue, please let me know your preferred remediation or coordinated disclosure process. If needed, I can also assist with CVE coordination after triage.

--
Best regards,
Zhihan Zheng
Beijing Institute of Technology


Reply via email to