oss-fuzz/projects/dnsmasq
Petr Menšík 909a0d7ed3
Attempt to fix insufficient extract_name buffer (#7293)
* Attempt to fix insufficient extract_name buffer

Some fuzzing failures happen because extract_name always uses in real
dnsmasq code daemon->namebuff of size at least MAXDNAME. Provide long
enough data also to fuzzed functions.

* Add myself as an interested party

Being dnsmasq maintainer in Fedora project and RHEL, I am interested in
new found failures. Especially when security related.

* Allocate full dhcp packet buffer

fuzz_dhcp can fail in clear packet. But that fails, because clear packet
always cleans whole buffer of maximal DHCP packet. But fuzzer allocates
less. Fix fuzzer to allocate similar memory as dhcp_common_init()
function of real dnsmasq.
2022-04-05 02:07:30 +00:00
..
Dockerfile dnsmasq: new fuzzing set up and fuzzers. (#5996) 2021-07-05 17:39:51 +01:00
build.sh dnsmasq: new fuzzing set up and fuzzers. (#5996) 2021-07-05 17:39:51 +01:00
fuzz_auth.c dnsmasq: new fuzzing set up and fuzzers. (#5996) 2021-07-05 17:39:51 +01:00
fuzz_dhcp.c Attempt to fix insufficient extract_name buffer (#7293) 2022-04-05 02:07:30 +00:00
fuzz_dhcp6.c dnsmasq: new fuzzing set up and fuzzers. (#5996) 2021-07-05 17:39:51 +01:00
fuzz_header.h Attempt to fix insufficient extract_name buffer (#7293) 2022-04-05 02:07:30 +00:00
fuzz_patch.patch dnsmasq: fix patch (#7252) 2022-02-08 22:51:27 +00:00
fuzz_rfc1035.c Attempt to fix insufficient extract_name buffer (#7293) 2022-04-05 02:07:30 +00:00
fuzz_util.c Attempt to fix insufficient extract_name buffer (#7293) 2022-04-05 02:07:30 +00:00
project.yaml Attempt to fix insufficient extract_name buffer (#7293) 2022-04-05 02:07:30 +00:00