<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to 18: NULL pointer defererence (ezxml_decode)</title><link>https://sourceforge.net/p/ezxml/bugs/18/</link><description>Recent changes to 18: NULL pointer defererence (ezxml_decode)</description><atom:link href="https://sourceforge.net/p/ezxml/bugs/18/feed.rss" rel="self"/><language>en</language><lastBuildDate>Mon, 25 Oct 2021 08:37:22 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/ezxml/bugs/18/feed.rss" rel="self" type="application/rss+xml"/><item><title>#18 NULL pointer defererence (ezxml_decode)</title><link>https://sourceforge.net/p/ezxml/bugs/18/?limit=25#a931</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The issue is due to bogus input data where an entity reference does not end in a ';'. The proposed patch addresses this.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Egbert Eich</dc:creator><pubDate>Mon, 25 Oct 2021 08:37:22 -0000</pubDate><guid>https://sourceforge.net544eb268a166ce1fbffbde885255faa0b9870f65</guid></item><item><title>NULL pointer defererence (ezxml_decode)</title><link>https://sourceforge.net/p/ezxml/bugs/18/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Function ezxml_decode() while parsing crafted XML file performs incorrect memory handling leading to heap buffer overread while running strlen() on NULL pointer.&lt;/p&gt;
&lt;p&gt;=================================================================&lt;br/&gt;
==21303==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f5b350b1746 bp 0x7fff4cc8acd0 sp 0x7fff4cc8a458 T0)&lt;br/&gt;
    0 0x7f5b350b1745 in strlen (/lib/x86_64-linux-gnu/libc.so.6+0x8b745)&lt;br/&gt;
    1 0x7f5b354601a5 in __interceptor_strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x701a5)&lt;br/&gt;
    2 0x40635b in ezxml_decode ezxml_0.8.6/ezxml.c:196&lt;br/&gt;
    3 0x415d2b in ezxml_parse_str ezxml_0.8.6/ezxml.c:525&lt;br/&gt;
    4 0x417a7a in ezxml_parse_fd ezxml_0.8.6/ezxml.c:641&lt;br/&gt;
    5 0x417d00 in ezxml_parse_file ezxml_0.8.6/ezxml.c:659&lt;br/&gt;
    6 0x401972 in main ezxml_0.8.6/test_ezxml.c:113&lt;br/&gt;
    7 0x7f5b3504682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)&lt;br/&gt;
    8 0x401c78 in _start (ezxml_0.8.6/test_ezxml_asan.exe+0x401c78)&lt;/p&gt;
&lt;p&gt;AddressSanitizer can not provide additional info.&lt;br/&gt;
SUMMARY: AddressSanitizer: SEGV ??:0 strlen&lt;br/&gt;
==21303==ABORTING&lt;/p&gt;
&lt;p&gt;Reproduction:&lt;/p&gt;
&lt;p&gt;Sample XML file leading to crash:&lt;/p&gt;
&lt;p&gt;crash_009_SEGV_ezxml_decode_strlen.raw&lt;/p&gt;
&lt;p&gt;Code snippet for reproduction:&lt;br/&gt;
ezxml_t result = ezxml_parse_file("crash_009_SEGV_ezxml_decode_strlen.raw");&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CVE Reporting</dc:creator><pubDate>Mon, 30 Dec 2019 19:32:59 -0000</pubDate><guid>https://sourceforge.netf5b2f0a9bea508ac3d332ca9f97d33f358dfbfd6</guid></item></channel></rss>