-
-
Notifications
You must be signed in to change notification settings - Fork 6.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
stack overflow while fuzzing parse-cbor-fuzzer #4242
Comments
Do you have a stack trace for the input? I would expect it to be a nested array - the CBOR equivalent to [[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[...]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]] I've seen these inputs being generated by OSSFuzz, and there is currently little we can do. |
I think you are right and the full stacktrace is similar as this : |
Could you elaborate? I would prefer not having a possible stack-overflow here. |
This issue has been marked as stale because it has been open for 90 days without activity. If this issue is still relevant, please add a comment or remove the "stale" label. Otherwise, it will be closed in 10 days. Thank you for helping us prioritize our work! |
bump |
The parser is implemented using recursive descent, and inputs that are nested too deeply result in a stack overflow. The example has 245 nested arrays and a stack trace of depth 492.
Yes, of course. What would be the alternatives? I can think of:
|
Description
poc.json
Reproduction steps
cat poc.json | ./parse_cbor_fuzzer
Expected vs. actual results
Expected no stack overflow.
Minimal code example
No response
Error messages
No response
Compiler and operating system
afl-clang-fast++
Library version
3.11.3
Validation
develop
branch is used.The text was updated successfully, but these errors were encountered: