Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS: fix another interger overflow in certificate processing #1915

Merged
merged 1 commit into from
Mar 30, 2023

Conversation

IvanNardi
Copy link
Collaborator

==5374==ERROR: AddressSanitizer: SEGV on unknown address 0x60400001a10d (pc 0x00000056e180 bp 0x7ffcca15ae20 sp 0x7ffcca15abe0 T0)
==5374==The signal is caused by a WRITE memory access.
SCARINESS: 30 (wild-addr-write)
    #0 0x56e180 in processCertificateElements ndpi/src/lib/protocols/tls.c:683:79
    #1 0x56c60f in LLVMFuzzerTestOneInput ndpi/fuzz/fuzz_tls_certificate.c:43:3

Found by oss-fuzz
See: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57448

```
==5374==ERROR: AddressSanitizer: SEGV on unknown address 0x60400001a10d (pc 0x00000056e180 bp 0x7ffcca15ae20 sp 0x7ffcca15abe0 T0)
==5374==The signal is caused by a WRITE memory access.
SCARINESS: 30 (wild-addr-write)
    #0 0x56e180 in processCertificateElements ndpi/src/lib/protocols/tls.c:683:79
    ntop#1 0x56c60f in LLVMFuzzerTestOneInput ndpi/fuzz/fuzz_tls_certificate.c:43:3
```
Found by oss-fuzz
See: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57448
@sonarcloud
Copy link

sonarcloud bot commented Mar 26, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@utoni utoni merged commit 6e0cd16 into ntop:dev Mar 30, 2023
@IvanNardi IvanNardi deleted the issue-57448 branch March 30, 2023 06:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants