Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add guardrail setting for TypeParser handling of type parameters #4011

Closed
cowtowncoder opened this issue Jul 4, 2023 · 0 comments
Closed
Labels
2.16 Issues planned for 2.16
Milestone

Comments

@cowtowncoder
Copy link
Member

(note: related to https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=60233)

Looks like TypeParser could benefit from limiting depth of type parameters handled for the rare cases where type parameters are included (only for, I think, EnumMap/EnumSet or such). This is not an exploitable attack vector of its own (since it is only used for specific cases for polymorphic deserialization with class names as type id) but seems like we might as well prevent any chance of corrupt input (... like created by fuzzer :) ) of producing SOEs.
So more for Fuzzer hygieny than anything else.

If simple/safe enough to target 2.15 try there; if not, 2.16.

@cowtowncoder cowtowncoder added to-evaluate Issue that has been received but not yet evaluated 2.16 Issues planned for 2.16 and removed to-evaluate Issue that has been received but not yet evaluated labels Jul 4, 2023
@cowtowncoder cowtowncoder added this to the 2.16.0 milestone Jul 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2.16 Issues planned for 2.16
Projects
None yet
Development

No branches or pull requests

1 participant