-
Notifications
You must be signed in to change notification settings - Fork 822
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OOB Read memory corruption bug #548
Comments
This issue appears to have been assigned CVE-2020-36325. |
This is not a bug. If this was really assigned a CVE I recon it should be retracted. |
Thanks for the analysis @DavidKorczynski |
Thanks @DavidKorczynski for the analysis. In this case probably the
CVE should be rejected. Note I was not the one requesting int but just
sent a request to reject it via https://cveform.mitre.org/
|
@DavidKorczynski FTR it got not REJECTED but now marked as "disputed", cf. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36325 |
Interesting, thanks for the update! I wonder how this plays out - I would think the CVE team must have some means of handling false positives in particular with memory unsafe languages and libraries. |
For reference "When one party disagrees with another party's assertion that a particular issue in software is a vulnerability, a CVE Record assigned to that issue may be designated as being "DISPUTED". In these cases, the CVE Program is making no determination as to which party is correct." from here https://cve.mitre.org/about/faqs.html#disputed_signify_in_cve_record However, in this case it seems rejected is the correct classification: |
Anyways - issue is closed and it's no big deal. |
Upstream notes this is not a valid real-world bug. akheron/jansson#548 (comment)
According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]>
Source: meta-openembedded MR: 113447 Type: Integration Disposition: Merged from meta-openembedded ChangeID: e0e79bb Description: According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
Source: meta-openembedded MR: 113447 Type: Integration Disposition: Merged from meta-openembedded ChangeID: e0e79bb Description: According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy Puhlman <[email protected]>
It is well known that functions like strlen that depend on null-terminated strings exclusively are not safe. But what about improving the API of jansson? |
According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]> (cherry picked from commit e0e79bb) [Fixup for Kirkstone context] Signed-off-by: Armin Kuster <[email protected]>
According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]> (cherry picked from commit e0e79bb) [Fixup for Kirkstone context] Signed-off-by: Armin Kuster <[email protected]>
Source: meta-openembedded MR: 124675 Type: Integration Disposition: Merged from meta-openembedded ChangeID: 96bd928 Description: According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] akheron/jansson#548 Signed-off-by: Marta Rybczynska <[email protected]> Signed-off-by: Armin Kuster <[email protected]> (cherry picked from commit e0e79bb) [Fixup for Kirkstone context] Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy A. Puhlman <[email protected]>
Hi,
I encountered an OOB read memory corruption bug when fuzzing Jansson.
Below you can find the crash log:
The fuzzer I used was:
Kind Regards,
Jordy Zomer
The text was updated successfully, but these errors were encountered: