Bug ID: 1905
           Summary: PCRE2 10.23-RC1 - SEGFAULT
           Product: PCRE
           Version: N/A
          Hardware: x86-64
                OS: Linux
            Status: NEW
          Severity: bug
          Priority: medium
         Component: Code

Created attachment 934
POC to trigger SEGFAULT (pcre2test)

- PCRE2 version 10.23-RC1 2016-08-01 (SVN revision: 573)

To reproduce the problem (pcre2test):
pcre2test segfault_573 /dev/null

ASAN output:

==32125==ERROR: AddressSanitizer: SEGV on unknown address 0x7f34eafd7297 (pc
0x7f34eae58568 bp 0x7ffecfb7a9b0 sp 0x7ffecfb76980 T0)
==32125==The signal is caused by a READ memory access.
    #0 0x7f34eae58567 in parse_regex
    #1 0x7f34eae58567 in pcre2_compile_8
    #2 0x4edf58 in process_pattern
    #3 0x4edf58 in main /home/kamil/Desktop/pcre/src/pcre2test.c:7739
    #4 0x7f34e9d5682f in __libc_start_main
    #5 0x41a828 in _start (/usr/local/bin/pcre2test+0x41a828)

Kamil Frankowicz

You are receiving this mail because:
You are on the CC list for the bug.
## List details at 

Reply via email to