Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 28 Dec 2022 17:01:53 +0530
From: Bugs Reporter <>
Subject: Bug in swab


I am writing to report a bug in the swab function of musl.
The bug is in the C implementation of swab as located in the src/string
directory of the musl repository. The musl version was `1.2.3` and the
source code was downloaded from the latest release
<> on the official website.
Please find a detailed report below.

Linux[0] manpage for swab() specifies that the function copies n bytes from
the array pointed to by from to the array pointed to by to, exchanging
adjacent even and odd bytes. This should also work for coinciding memories
and musl's implementation does not take that into account.
An example input is:
    char src[] = {65, 64};
    void* dst = src;
    swab(src, dst, 2);
    if (src[0] != 64 || src[1] != 65) {

The file that demonstrates the bug can be found here
A patch that applies the necessary fix is available here



Jai Arora, Abhishek Rose, Shubhani Gupta, Sorav Bansal
CompilerAI Research Group
IIT Delhi, India

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.