Skip to content

Fix issue 458: Add null checking #459

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jan 16, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -777,13 +777,13 @@ protected void _releaseBuffers() throws IOException
@Override
public JsonToken nextToken() throws IOException
{
_numTypesValid = NR_UNKNOWN;
// For longer tokens (text, binary), we'll only read when requested
if (_tokenIncomplete) {
_skipIncomplete();
}
_tokenInputTotal = _currInputProcessed + _inputPtr;
// also: clear any data retained so far
_numTypesValid = NR_UNKNOWN;
_binaryValue = null;

// First: need to keep track of lengths of defined-length Arrays and
Expand Down Expand Up @@ -1112,6 +1112,9 @@ protected JsonToken _handleTaggedBinary(TagList tags) throws IOException
} else {
// 12-May-2016, tatu: Since that's all we know, let's otherwise
// just return default Binary data marker
// 16-Jan-2024, tatu: Esoteric edge case where we have marked
// `int` as being tokenized
_numTypesValid = NR_UNKNOWN;
return (_currToken = JsonToken.VALUE_EMBEDDED_OBJECT);
}

Expand Down Expand Up @@ -1558,7 +1561,7 @@ public String nextFieldName() throws IOException
return name;
}
// otherwise just fall back to default handling; should occur rarely
return (nextToken() == JsonToken.FIELD_NAME) ? getCurrentName() : null;
return (nextToken() == JsonToken.FIELD_NAME) ? currentName() : null;
}

// 06-Apr-2023, tatu: Before Jackson 2.15, we had optimized variant, but
Expand Down Expand Up @@ -2224,6 +2227,11 @@ protected void convertNumberToBigDecimal() throws IOException
// Let's parse from String representation, to avoid rounding errors that
//non-decimal floating operations would incur
final String text = getText();
// 16-Jan-2024, tatu: OSS-Fuzz managed to trigger this; let's fail
// explicitly
if (text == null) {
_throwInternal();
}
streamReadConstraints().validateFPLength(text.length());
_numberBigDecimal = NumberInput.parseBigDecimal(
text, isEnabled(StreamReadFeature.USE_FAST_BIG_NUMBER_PARSER));
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
package com.fasterxml.jackson.dataformat.cbor.fuzz;

import com.fasterxml.jackson.core.JsonParser;
import com.fasterxml.jackson.core.JsonToken;
import com.fasterxml.jackson.core.exc.StreamReadException;

import com.fasterxml.jackson.databind.ObjectMapper;

import com.fasterxml.jackson.dataformat.cbor.CBORTestBase;

public class CBORFuzz458_65768_NPETest extends CBORTestBase
{
private final ObjectMapper MAPPER = cborMapper();

public void testInvalidText() throws Exception
{
final byte[] input = readResource("/data/clusterfuzz-cbor-65768.cbor");
try (JsonParser p = MAPPER.createParser(input)) {
try {
assertNull(p.nextTextValue());
assertToken(JsonToken.VALUE_NUMBER_FLOAT, p.currentToken());
assertEquals(0, p.getIntValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertNull(p.nextTextValue());
assertToken(JsonToken.VALUE_EMBEDDED_OBJECT, p.currentToken());
p.getFloatValue();
p.getDecimalValue();
fail("Should not reach here (invalid input)");
} catch (StreamReadException e) {
verifyException(e, "Current token (VALUE_EMBEDDED_OBJECT) not numeric");
}
}
}
}
Binary file not shown.
2 changes: 2 additions & 0 deletions release-notes/CREDITS-2.x
Original file line number Diff line number Diff line change
Expand Up @@ -303,3 +303,5 @@ Arthur Chan (@arthurscchan)
(2.17.0)
* Contributed #451: (cbor) `IndexOutOfBoundsException` in `CBORParser` for invalid input
(2.17.0)
* Contributed #458: (cbor) Unexpected NullPointerException in `CBORParser`
(2.17.0)
2 changes: 2 additions & 0 deletions release-notes/VERSION-2.x
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,8 @@ Active maintainers:
(fix contributed by Arthur C)
#451: (cbor) `IndexOutOfBoundsException` in `CBORParser` for invalid input
(fix contributed by Arthur C)
#458: (cbor) Unexpected NullPointerException in `CBORParser`
(fix contributed by Arthur C)
- (ion) Update `com.amazon.ion:ion-java` to 1.11.0 (from 1.10.5)

2.16.1 (24-Dec-2023)
Expand Down