-
Notifications
You must be signed in to change notification settings - Fork 1.4k
zebra: Fix buffer overflows found by fuzzing. #19303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Fixed a stack buffer overflow in `zread_srv6_manager_release_locator_chunk` and `zread_srv6_manager_get_locator_chunk` by adding a check to ensure the length read from the stream does not exceed the stack buffer size. https: //oss-fuzz.com/testcase-detail/5455147614994432 https: //issues.oss-fuzz.com/issues/42504504 Change-Id: Ib28a49ca0a034542a45f25a15c5588ad5310f0ac Signed-off-by: Oliver Chang <ochang@google.com>
12b2ed5
to
f2e8cdc
Compare
@Mergifyio backport stable/10.4 stable/10.3 stable/10.2 stable/10.1 |
✅ Backports have been created
|
This was referenced Jul 31, 2025
donaldsharp
added a commit
that referenced
this pull request
Jul 31, 2025
zebra: Fix buffer overflows found by fuzzing. (backport #19303)
donaldsharp
added a commit
that referenced
this pull request
Jul 31, 2025
zebra: Fix buffer overflows found by fuzzing. (backport #19303)
donaldsharp
added a commit
that referenced
this pull request
Jul 31, 2025
zebra: Fix buffer overflows found by fuzzing. (backport #19303)
donaldsharp
added a commit
that referenced
this pull request
Jul 31, 2025
zebra: Fix buffer overflows found by fuzzing. (backport #19303)
Jafaral
added a commit
that referenced
this pull request
Aug 2, 2025
Bug Fixes: * bgpd: initialize local variable (backport #19233) * ospfd: Use after free cleanup of lsa (backport #19224) * vtysh: copy config from file should actually apply (backport #19242) * Revert PR #18358: BGP evpn testing and bug fixes related to non default EVPN backbone (backport #19241) * topotests: improve embedded RP test reliability (backport #19240) * lib, zebra: mark singleton nexthops inactive/active on link state changes for wecmp (backport #18947) * bgpd: LL next-hop capabilty fixes (backport #19261) * eigrp: validate hello packets and tlvs better (backport #19251) * bgpd: Fix compilation error in bgpd module: Update TP_ARGS for bgp (backport #19266) * bgpd: Ensure addpath does not withdraw selected route in some situations (backport #19210) * bgpd: [GR] fixed selectionDeferralTimer to display select_defer_time val by #19282 * bgpd: LL next-hop capabilty fixes (round 2) (backport #19277) * lib: compute link-state zapi message size (backport #19290) * zebra: Fix buffer overflows found by fuzzing. (backport #19303) Signed-off-by: Jafar Al-Gharaibeh <jafar@atcorp.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixed a stack buffer overflow in
zread_srv6_manager_release_locator_chunk
andzread_srv6_manager_get_locator_chunk
by adding a check to ensure the length read from the stream does not exceed the stack buffer size.https://oss-fuzz.com/testcase-detail/5455147614994432
https://issues.oss-fuzz.com/issues/42504504