-
Notifications
You must be signed in to change notification settings - Fork 3.3k
OOB access in parse_string
#800
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Gentle ping on this issue! |
I've submitted a possible fix. Though only for the specific bug caught, and not the issue with the existing fuzz target being unable to catch such a bug. That's also important to fix. |
curl --include --request GET |
Is there an ID (CVE) registered for that? |
With the following fuzz target:
And this input (with no trailing newline)
We get the following ASan OOB read report:
Note this isn't caught by the existing fuzz target because it enforces the input having a null terminator, which hides this OOB access:
cJSON/fuzzing/cjson_read_fuzzer.c
Line 23 in cb8693b
The text was updated successfully, but these errors were encountered: