Skip to content

Conversation

Shivam7-1
Copy link

Issue link: https://issues.oss-fuzz.com/issues/385326441
Fixes a stack-buffer-overflow vulnerability by properly calculating the buffer size for zone name assignment. Ensures memory is allocated correctly and strlcpy is used safely, preventing overflows while maintaining compatibility with the maximum allowed zone name length.

@BiryaniDjaj
Copy link

I’m curious how you approached the project to be able to fix this, did you stick closely to the Bazel/Nix setup in the repo or take a different route?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants