Fix out of bounds memory read in onig_node_str_cat#164
Open
sashashura wants to merge 2 commits intok-takata:masterfrom
Open
Fix out of bounds memory read in onig_node_str_cat#164sashashura wants to merge 2 commits intok-takata:masterfrom
onig_node_str_cat#164sashashura wants to merge 2 commits intok-takata:masterfrom
Conversation
Author
|
Given #165 and this PR, does it make sense to create a fork that accepts security patches and then use that fork? |
Author
|
I have contemplated making local temporary changes in https://github.com/fluent/fluent-bit/tree/master/lib/onigmo. Making a temporary fork for security patches only until this repository gets back to life is an option if there are more dependent repositories willing to adopt it. In any case fluent-bit maintainers have to be convinced to make a change (either local patch or reference another fork), but they hesitate to accept security patches even in their code so far. |
sashashura
added a commit
to sashashura/fluent-bit
that referenced
this pull request
Sep 5, 2022
Temporary fix until k-takata/Onigmo#164 is merged
sashashura
added a commit
to sashashura/fluent-bit
that referenced
this pull request
Sep 5, 2022
Temporary fix until k-takata/Onigmo#164 is merged Signed-off-by: sashashura <93376818+sashashura@users.noreply.github.com>
sashashura
added a commit
to sashashura/fluent-bit
that referenced
this pull request
Sep 5, 2022
Temporary fix until k-takata/Onigmo#164 is merged Signed-off-by: sashashura <93376818+sashashura@users.noreply.github.com>
sashashura
added a commit
to sashashura/onigmo-1
that referenced
this pull request
Sep 7, 2022
Temporary fix until k-takata/Onigmo#164 is merged Signed-off-by: sashashura <93376818+sashashura@users.noreply.github.com>
sashashura
added a commit
to sashashura/onigmo-1
that referenced
this pull request
Sep 7, 2022
Temporary fix until k-takata/Onigmo#164 is merged Signed-off-by: sashashura <93376818+sashashura@users.noreply.github.com>
edsiper
pushed a commit
to fluent/onigmo
that referenced
this pull request
Sep 11, 2022
Temporary fix until k-takata/Onigmo#164 is merged Signed-off-by: sashashura <93376818+sashashura@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR fixes out of bounds memory read in
onig_node_str_catrevealed by fuzzing fluent-bit:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46049
The root cause is that a call to
encleninside ofPFETCHmacro when called infetch_tokenresults in a call toonigenc_mbclen_approximate.When the value of
ppassed to the function is\xeceven though it is the last byte in multibyte sequince (the next byte is unexpected string terminator \0) theonigenc_mbclen_approximatereturns it's size as 4. The size is added to the overall string length and results in reading past the end of the string.