Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Fix int overflow in parser #694

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
Loading
from
Open

Conversation

sylr
Copy link
Contributor

@sylr sylr commented Feb 25, 2025

A maliciously crafted message with a bogus body length could make the parser panic if the body length is close to the int limit.

Fixes #678

A maliciously crafted message with a bogus body length could make the
parser panic if the body length is close to the int limit.

Fixes quickfixgo#678

Signed-off-by: Sylvain Rabot <sylvain@abstraction.fr>
@sylr
Copy link
Contributor Author

sylr commented Mar 18, 2025

@ackleymi could you please review this ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Panic in ParseMessage and newParser()->ReadMessage() due to malformed data
1 participant
Morty Proxy This is a proxified and sanitized view of the page, visit original site.