-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Vulnerability - Action Required: Integer Overflow to Buffer Overflow vulnerability may in your project #7556
Comments
Hi, from your point of view, what is the issue (i.e. what are you going to fix with a PR)? |
@alexey-tikhonov Hi, maybe I'm going to fix it by using pointer-based iteration just like the fix in mongodb/mongo-c-driver@effd95c. It may avoid overflow. |
Well, the question was "what" is the issue, not "how" to fix it. I don't think overflow of In this sense change of iterator from int to pointer is quite cosmetic but it won't hurt either. |
I know, but if the |
Sorry I didn't understand this question. |
I mean there is no need that |
Hi,
we have detected that your project may be vulnerable to Integer Overflow to Buffer Overflow in the function of
free_args
in the file ofsrc/util/util.c
. It shares similarities to a recent CVE disclosure CVE-2024-6381 in the mongo-c-driver.The source vulnerability information is as follows:
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: