Skip to content

fix: the http response callback performs memcpy with... in...#156

Open
orbisai0security wants to merge 1 commit into
vercel-labs:mainfrom
orbisai0security:fix-heap-buffer-overflow-curl-response-append
Open

fix: the http response callback performs memcpy with... in...#156
orbisai0security wants to merge 1 commit into
vercel-labs:mainfrom
orbisai0security:fix-heap-buffer-overflow-curl-response-append

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in native/zero-c/runtime/zero_http_curl.c.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File native/zero-c/runtime/zero_http_curl.c:114
CWE CWE-120

Description: The HTTP response callback performs memcpy with a size derived from incoming network data. While a too_large flag exists, it may not prevent overflow in all scenarios, particularly with chunked transfer encoding where multiple callbacks accumulate data before the flag is checked. If accumulated size exceeds the pre-allocated buffer before the flag triggers, a heap buffer overflow occurs.

Changes

  • native/zero-c/runtime/zero_http_curl.c

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by OrbisAI Security
@vercel
Copy link
Copy Markdown

vercel Bot commented May 20, 2026

@orbisai0security is attempting to deploy a commit to the Vercel Labs Team on Vercel.

A member of the Team first needs to authorize it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant