]> git.ipfire.org Git - thirdparty/openssl.git/commit
Reduce Max number of commands handled per fuzzer pass in quic-lcidm. openssl-3.5
authorNeil Horman <nhorman@openssl.org>
Wed, 1 Oct 2025 21:34:38 +0000 (17:34 -0400)
committerTomas Mraz <tomas@openssl.org>
Sat, 4 Oct 2025 08:29:46 +0000 (10:29 +0200)
commitf0d0e7f1e13331a2df7ae23d9242399630d20807
tree5ecee3a15121d5962c04a95893b2957c8488150c
parent0981d8971cd6580a74e49480e7e12e3947cd929a
Reduce Max number of commands handled per fuzzer pass in quic-lcidm.

We've gotten a few recent reports of a hang in the quic-lcidm fuzzer:

https://issues.oss-fuzz.com/issues/448510502

It looks pretty straightforward (I think).  The fuzzer input buffer is
used in this particular case to randomly issue commands to the lcidm
hash table (add/delete/query/flush/etc).

The loop for the command processing (based on the input buffer), is
limited to 10k commands.  However the fuzzer will on occasion provide
very large buffers (500k) which easily saturate that limit.  If the
input buffer happens to do something like get biased toward mostly
additions, we wind up with a huge hashtable that has to constantly grow
and rehash, which we've seen leads to timeouts in the past.

Most direct fix I think here, given that this is something of an
artificial failure in the fuzzer, is to simply clamp the command limit
more.

Fixes openssl/project#1664

Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28724)

(cherry picked from commit 01c7958f2359e951a95350affb6b178fb50fed03)
fuzz/quic-lcidm.c