-
Notifications
You must be signed in to change notification settings - Fork 7.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heap Use-After-Free (UAF) Bug in PHP #16726
Comments
I can confirm the UAF, but this is not a vulnerability (just really nonsenstical PHP code). |
Right. There are so many of them I'm honestly not sure they are worth investing more time in... Unfortunately, the same issue often goes for |
I don't know why you think this was fixed by 24ff7ee, but it's not. It's unrelated. |
Yes. I believe the bug never be repaired, I am curious why it is marked as fixed in OSS repo at here https://github.com/google/oss-fuzz-vulns/blob/main/vulns/php/OSV-2021-1199.yaml#L27 |
Description
Description:
I encountered a heap UAF bug in PHP with commit fb257ee I built the binary following OSS-Fuzz's guidelines, and the bug was reproduced in
php-fuzz-execute
.This test case is a regression of OSV-2021-1199 (details here), which was marked as fixed in commit 24ff7ee.
Sanitizer Report:
The sanitizer report is as follows:
Please investigate and provide feedback. This issue might represent a reoccurrence of a previously patched vulnerability.
PHP Version
fb257ee
Operating System
No response
The text was updated successfully, but these errors were encountered: