99 times out of 100, a segfault in strcmp() is a bug in the caller,
feeding strcmp() a nonsensical pointer to la-la land.  strcmp() itself
doesn't really do much with memory that could lead to a segv, other than
attempt to access the two chars you asked it to look at.  If one or both
aren't actually there, you're going to have a bad day.

If you can give me a test case that shows strcmp() itself being fed non-
garbage values and then crashing, please do, but otherwise, I'm marking
this Incomplete for now.

** Changed in: glibc (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1773796

Title:
  Segmentation fault in __strcmp_ssse3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1773796/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to