NotIbutWind

Results 7 issues of NotIbutWind

Hi, I have found a bug when I fuzzing . When I enter an input file to a program use toml.h with parseFile, it cause a stack-overflow at parseFile function....

Here is the seed that cause the ABRT when parse it use parseFile. you can use your parse_file.cc to reproduce the ABRT. I think it occured at void toml::failwith

in sdp_extract_attr:1343-1348, there are SDP_ALT8, SDP_ALT16, SDP_ALT32 types use "extract_seq" to parse PDU data. When I use "sdp_extract_pdu" to parse PDU data, will go into sdp_extract_attr. And so there will...

input value : "@\?@ABCDEFGHIJiLM$^\^&(^( you can use ASAN compile the lib and the API JsonValue* value = AJson->Parse(jsonString); it supply and input this value to the API . it can...

test.c: char* jstr = ":#@\$^\^&*^("; JsonValue* value = AJson->Parse(jstr); if(value != NULL) AJson->Destroy(value); ================================================================= ==2239161==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x564852e30c19 bp 0x7fff7edbef40 sp 0x7fff7edbef10 T0) ==2239161==The signal...

input value :#@\$^\^&*^( 1 enter the project code path 2 CC=gcc -fsanitize=address make 3 ./highligher #@\$^\^&*^( 4 program crash and the stacktrace is : Direct leak of 248 byte(s) in...

there is memory leak in mpca_lang function 1、 compile the lib with asan : make CC=gcc -fsanitize=address -g 2、test.c: example/foobar.c 3、input: char* foobar = "#@\$^\^&*^(\x00"; argv[1] = "#@\$^\^&*^(\x00"; 4 compile...