General

Profile

grajagandev (David Moore)

  • Login: grajagandev
  • Registered on: 04/25/2016
  • Last sign in: 06/07/2016

Issues

open closed Total
Assigned issues 0 0 0
Reported issues 0 5 5

Activity

06/02/2016

03:51 PM Ruby Bug #12454: Regexp: Segfault due to Invalid Read in regcomp.c : add_char_opt_map_info
Here is a simpler case - it is an ascii only, valid regular expression according to grep:
~~~
# cat bug-12454-ascii
((?<V>0(00*)(\0>))00*00*00*$00*)(\g<0>)00*00*00*
# xxd bug-12454-ascii
0000000: 2828 3f3c 563e 3028 3030 2a29 2...
grajagandev (David Moore)
02:55 PM Ruby Bug #12454 (Closed): Regexp: Segfault due to Invalid Read in regcomp.c : add_char_opt_map_info
A crafted regular expression will cause a segmentation fault due to an invalid one byte read on 32-bit Ubuntu 14.04. The interesting part of the regular expression is: '\g\<0>' which is a recursive reference to the 0th sub-pattern.
~~...
grajagandev (David Moore)

05/24/2016

06:02 PM Ruby Bug #12423 (Closed): Regexp: Heap Buffer Overflow in regparse.c : next_state_value()
A crafted regular expression will cause a heap buffer overflow leading to invalid 4 byte reads/writes on 32-bit Ubuntu 14.04. The regular expression fails to close a character class and has an octal zero as the first character in the cha... grajagandev (David Moore)
01:38 PM Ruby Bug #12420 (Closed): Regexp: Segfault due to Invalid Read in regparse.c : bbuf_free()
A crafted regular expression will cause an invalid 4 byte read on 32-bit Ubuntu 14.04. The regular expression fails to close a character class and has an octal space as the first character in the character class.
~~~
grajagandev# ca...
grajagandev (David Moore)

05/23/2016

03:44 PM Ruby Bug #12418 (Closed): Regexp: Segfault due to Invalid Read in regerror.c : to_ascii()
A crafted regular expression will cause an invalid 4 byte read on 32-bit Ubuntu 14.04. The regular expression has several errors – this bug occurs during the process of creating the OnigErrorInfo structure and appears to be an encoding i... grajagandev (David Moore)

05/18/2016

03:26 AM Ruby Bug #12390 (Closed): Heap Buffer Overflow in Marshal Load on 32-bit
A heap buffer overflow occurs when marshal loading (un-marshaling) crafted data on 32-bit Ubuntu 14.04.
It appears that a string length indicated by the marshaled data of 0x7fffffff triggers the overflow. It causes ruby to expect an...
grajagandev (David Moore)

Also available in: Atom