-
Notifications
You must be signed in to change notification settings - Fork 673
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heap overflow in jerry-core #3976
Comments
Hi, seems this issue has been opened for a month. Is there any plan to fix this issue? |
Jerry is an open project where anybody can open PRs not just contributors, so feel free to fix it. |
Thanks for reporting this issue. Of course it would be great to fix this real bug, but it doesn't |
just a notice, still valid issue today on latest master ( 0ffe166 ) |
Hi, |
It looks like it is not valid anymore. I think we can close this. |
Do you happen to know where the fix was applied ? @zherczeg Thanks in advance ! |
I bisected, 841d536 was the hash fixed the assertion. Now we get syntaxerror for this poc.js:
Otherwise it would be great to add this poc.js to jerry test case. |
I am curious about something. I searched the cve entry, and it provided very little information. It says something this bug is a vulnerability, but no example is provided. I thought you need to provide a program which does something, e.g. runs a shell script in jerry-main using this bug (that you cannot normally do). How can somebody be sure it is an actual vulnurability without proving it? |
@zherczeg When asking for a CVE ID, you do not need to provide much and there are no standards for submitting evidence of the vulnerability. They assign blindly in most cases and will REJECT the ID later if it is disputed by the vendor and the vendor provides evidence. Not exactly fair to the vendor but that is how the process has been for a long time. |
That is interesting. So you can open a cve for every bug in every project in practice? So is it a global issue tracker? |
In theory yes, but if MITRE noticed a flood of requests they would likely scrutinize them a bit more and start rejecting the request or ignoring them. As long as it works (or works close enough) they are likely to let it run as is. |
@zherczeg I think we shouldn't trivialize heap buffer overflow issues. All of them should be treated as possible security vulnerability until we can't fix the issue or we can prove if it is a harmless or false bug. We can't expect complete exploit to take an issue seriously. |
Please also review: |
JerryScript revision
git hash: 392ee71
Test case
In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed
Execution steps
./jerry poc.js
Build cmd
python tools/build.py --compile-flag="-fsanitize=address"
Stack dump:
The text was updated successfully, but these errors were encountered: