Closed oliverchang closed 11 months ago
Thanks for reporting. I was about to say, interesting that clusterfuzz didn't catch that one yet, but plist_from_memory isn't part of the harness.
Thanks for the response!
And heh, this is an auto-generated target we got as part of https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html. We're hoping to roll this out more broadly next year for all OSS-Fuzz projects.
Nice! Fixed the OOB access with 8487d23fd2ab5683d631fd41e5f6a2f5a44d867a.
This was found using this fuzz target:
If we pass an input containing a single whitespace character, we get the following crash.
The root cause looks like there's some bounds checking that needs to happen after whitespace characters are skipped here: https://github.com/libimobiledevice/libplist/blob/c46afc87ad605936ebcb6c03d3f309f818fd6f09/src/plist.c#L224