fix invalid read on corrupt ziplist (#9831)
If the last bytes in ziplist are corrupt and we decode from tail to head, we may reach slightly outside the ziplist.
This commit is contained in:
parent
b161cff5f9
commit
a3a014294f
@ -1160,6 +1160,8 @@ unsigned char *ziplistIndex(unsigned char *zl, int index) {
|
||||
/* No need for "safe" check: when going backwards, we know the header
|
||||
* we're parsing is in the range, we just need to assert (below) that
|
||||
* the size we take doesn't cause p to go outside the allocation. */
|
||||
ZIP_DECODE_PREVLENSIZE(p, prevlensize);
|
||||
assert(p + prevlensize < zl + zlbytes - ZIPLIST_END_SIZE);
|
||||
ZIP_DECODE_PREVLEN(p, prevlensize, prevlen);
|
||||
while (prevlen > 0 && index--) {
|
||||
p -= prevlen;
|
||||
|
@ -774,5 +774,16 @@ test {corrupt payload: fuzzer findings - lpFind invalid access } {
|
||||
}
|
||||
}
|
||||
|
||||
test {corrupt payload: fuzzer findings - invalid access in ziplist tail prevlen decoding} {
|
||||
start_server [list overrides [list loglevel verbose use-exit-on-panic yes crash-memcheck-enabled no] ] {
|
||||
r debug set-skip-checksum-validation 1
|
||||
r config set sanitize-dump-payload no
|
||||
r restore _listbig 0 "\x12\x02\x02\x1B\x1B\x00\x00\x00\x16\x00\x00\x00\x05\x00\x00\x02\x5F\x39\x04\xF9\x02\x02\x5F\x37\x04\xF7\x02\x02\x5F\x35\xFF\x02\x19\x19\x00\x00\x00\x16\x00\x00\x00\x05\x00\x00\xF5\x02\x02\x5F\x33\x04\xF3\x02\x02\x5F\x31\xFE\xF1\xFF\x0A\x00\x64\x0C\xEB\x03\xDF\x36\x61\xCE"
|
||||
catch { r RPOPLPUSH _listbig _listbig }
|
||||
assert_equal [count_log_message 0 "crashed by signal"] 0
|
||||
assert_equal [count_log_message 0 "ASSERTION FAILED"] 1
|
||||
}
|
||||
}
|
||||
|
||||
} ;# tags
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user