Skip to content

Conversation

@Babyhamsta
Copy link
Contributor

  • fix: bound cipher memcpy to 5 bytes (4 hex + NUL) to stop overflowing 5-byte pool alloc in ja4->ciphers copy

  • Previously copied the entire hex stack buffer (longer than dest), corrupting request pools and crashing workers. ----

  • fix: correct sigalgs iteration bounds in JA4

  • Call SSL_get_sigalgs starting at index 0 (not -1) and loop i=0..num_sigalgs-1; avoids out-of-bounds write into the sigalgs array.

  • These fixes are for items that were causing worker crashes with rapid requests. This was tested originally with 200 rapid tests which caused multiple crashes, after these patches it was tested again with 2,000 requests with no crashes.

  • Verified this locally with no issues after these patches.

- fix: bound cipher memcpy to 5 bytes (4 hex + NUL) to stop overflowing 5-byte pool alloc in ja4->ciphers copy
- Previously copied the entire hex stack buffer (longer than dest), corrupting request pools and crashing workers.
----
- fix: correct sigalgs iteration bounds in JA4
- Call SSL_get_sigalgs starting at index 0 (not -1) and loop i=0..num_sigalgs-1; avoids out-of-bounds write into the sigalgs array.

- These fixes are for items that were causing worker crashes with rapid requests. This was tested originally with 200 rapid tests which caused multiple crashes, after these patches it was tested again with 2,000 requests with no crashes.
@vlvkobal vlvkobal merged commit 64899a2 into FoxIO-LLC:main Nov 23, 2025
1 check passed
@vlvkobal
Copy link
Member

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants