Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:80628 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 68904 invoked from network); 16 Jan 2015 09:22:53 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 16 Jan 2015 09:22:53 -0000 Authentication-Results: pb1.pair.com smtp.mail=git@internot.info; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=git@internot.info; sender-id=pass Received-SPF: pass (pb1.pair.com: domain internot.info designates 185.57.82.47 as permitted sender) X-PHP-List-Original-Sender: git@internot.info X-Host-Fingerprint: 185.57.82.47 mail.internot.info Received: from [185.57.82.47] ([185.57.82.47:59540] helo=mail.internot.info) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AE/B5-39838-C68D8B45 for ; Fri, 16 Jan 2015 04:22:52 -0500 To: internals@lists.php.net Cc: Joshua Rogers Date: Fri, 16 Jan 2015 20:22:39 +1100 Message-ID: <1421400159-19792-1-git-send-email-git@internot.info> Subject: [PATCH] Fix null pointer dereferences From: git@internot.info (Joshua Rogers) -- Multiple places 'spprintf' is called with a NULL 'pbuf', which passes itself to vspprintf, which dereferences it. Although most places check whether 'pbuf'(normally called 'error') is null, it is smarter to check it inside the function that requires a non-null value. This will avoid future problems, too. See bug #68839 [https://bugs.php.net/bug.php?id=68839] for an example of NULL being passed to spprintf. There are multiple other places checks are not used to confirm error/pbuf is not null. --- main/spprintf.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/main/spprintf.c b/main/spprintf.c index cd14882..ba12868 100644 --- a/main/spprintf.c +++ b/main/spprintf.c @@ -840,6 +840,17 @@ PHPAPI size_t vspprintf(char **pbuf, size_t max_len, const char *format, va_list smart_string buf = {0}; size_t result; + + /* + * Test 'pbuf'(also known as 'error') against NULL, + * since it is called multiple places without + * checking against NULL, causing null pointer + *dereferences. + */ + if(!pbuf) { + return 0; + } + xbuf_format_converter(&buf, 1, format, ap); if (max_len && buf.len > max_len) { -- 1.9.1