Hi, While I was auditing frozen library using PyJFuzz, I came across a stack based overflow using the following testcase with address sanitizer. [e1f555ceb332dc1717778aba679cfdda20939edf.txt](https://github.com/cesanta/frozen/files/791952/e1f555ceb332dc1717778aba679cfdda20939edf.txt) I didn't investigate further, anyway there're other exploitable issue, I'll report later. Thanks for your support! Regards, Daniele