Skip to content

Fix uregex_open_fuzzer: hardcoded flags and unaligned memory access#3919

Open
OwenSanzas wants to merge 2 commits intounicode-org:mainfrom
OwenSanzas:fix-uregex-open-fuzzer-flags
Open

Fix uregex_open_fuzzer: hardcoded flags and unaligned memory access#3919
OwenSanzas wants to merge 2 commits intounicode-org:mainfrom
OwenSanzas:fix-uregex-open-fuzzer-flags

Conversation

@OwenSanzas
Copy link
Copy Markdown

Summary

Fix two issues in uregex_open_fuzzer.cpp that limit fuzzing effectiveness.

1. Hardcoded flags parameter

The fuzzer always passes 0 for the flags parameter to uregex_open(), meaning it only ever tests regex compilation with default flags. The regex engine supports UREGEX_CASE_INSENSITIVE, UREGEX_MULTILINE, UREGEX_DOTALL, UREGEX_COMMENTS, and other flags that exercise different code paths — none of which are being tested.

Fix: Derive flags from the first byte of fuzzer input instead of hardcoding 0.

2. Unaligned memory access

The fuzzer casts data directly to char16_t* via reinterpret_cast<const char16_t*>(data). Since data is not guaranteed to be 2-byte aligned, this causes undefined behavior and faults on architectures with strict alignment requirements (e.g., ARM).

Fix: Copy the pattern data to a properly aligned buffer using memcpy, consistent with the approach used in other ICU fuzzers.

Coverage comparison (60 seconds, empty seed corpus, ASan, libFuzzer)

Metric Original Fixed Change
Edge coverage 2031 2404 +18.37% (+373 edges)
Feature coverage 6881 9266 +34.66% (+2385 features)

The +18% edge coverage increase confirms that the hardcoded flags were preventing exploration of significant portions of the regex engine.

…om fuzz data

The harness reads UListFormatterType and UListFormatterWidth directly
from fuzz data via memcpy into enum variables without validation.
Loading arbitrary bit patterns into C++ enum types is undefined behavior,
confirmed by UndefinedBehaviorSanitizer:

  runtime error: load of value 2125315823, which is not a valid value
  for type 'UListFormatterType'

The fix reads into int32_t first, then clamps to valid enum ranges before
casting. The redundant third createInstance call (which was the only one
using validated values) is removed since the second call now uses
validated values.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant