From 46b33d2b45075b5b538e92491751d8a6279b26f9 Mon Sep 17 00:00:00 2001 From: Howard Chu Date: Tue, 6 Jan 2026 20:52:25 +0000 Subject: [PATCH] ITS#10421 mdb_load: check for malicious input --- libraries/liblmdb/mdb_load.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/libraries/liblmdb/mdb_load.c b/libraries/liblmdb/mdb_load.c index d266b4f6e1..4e9dbcbabf 100644 --- a/libraries/liblmdb/mdb_load.c +++ b/libraries/liblmdb/mdb_load.c @@ -208,6 +208,12 @@ badend: c1 = buf->mv_data; len = strlen((char *)c1); + if (!len) { + /* This can only happen with an intentionally invalid input + * with a NUL byte after the leading SPACE + */ + goto badend; + } l2 = len; /* Is buffer too short? */