<feed xmlns='http://www.w3.org/2005/Atom'>
<title>cgi-io/tests/fuzz/corpus, branch master</title>
<subtitle>CGI utility for handling up/downloading of files etc.</subtitle>
<id>https://git-03.infra.openwrt.org/project/cgi-io/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/cgi-io/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/cgi-io/'/>
<updated>2020-10-27T22:03:04Z</updated>
<entry>
<title>Fix off-by-one in postdecode_fields</title>
<updated>2020-10-27T22:03:04Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2020-10-11T11:57:10Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/cgi-io/commit/?id=09f9ac5066ee71f7cc1d5a6401dfa7f49d1dd677'/>
<id>urn:sha1:09f9ac5066ee71f7cc1d5a6401dfa7f49d1dd677</id>
<content type='text'>
Fixes following error found by fuzzer:

 ERROR: AddressSanitizer: SEGV on unknown address 0x60c000120000 (pc 0x00000054f64f bp 0x000000000008 sp 0x7ffe4fc2c120 T0)
 The signal is caused by a READ memory access.
    #0 0x54f64f in postdecode_fields cgi-io/util.c:93:7
    #1 0x54f382 in LLVMFuzzerTestOneInput cgi-io/tests/fuzz/test-fuzz.c:36:6

That is caused by reading 1 byte past the size of the buffer.

Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
<entry>
<title>Add fuzzing of utility functions</title>
<updated>2020-10-27T22:03:04Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2020-10-11T11:21:16Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/cgi-io/commit/?id=ed8ce0d5d28b745cfe9b2eda0d70f9ce4b147092'/>
<id>urn:sha1:ed8ce0d5d28b745cfe9b2eda0d70f9ce4b147092</id>
<content type='text'>
Thus increase fuzzing coverage.

Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
</feed>
