mirror of https://github.com/google/oss-fuzz.git
7579d5d84f
The compression function appears to account for the possibility that the buffer contains random values, but msan does not realize that. Initializing the buffer would be another option, but mere unpoisoning maintains the ability to detect flaws in the way that the library handles such uninitialized buffers. (Although, arguably, perhaps this would be better served by separate fuzzing, which would also make such findings more reproducible.) This fixes b/154387018. |
||
---|---|---|
.. | ||
lzo_decompress_target_seeds | ||
Dockerfile | ||
all_lzo_compress.cc | ||
build.sh | ||
lzo_compress_target.c | ||
lzo_compress_target.options | ||
lzo_decompress_target.c | ||
lzo_decompress_target.options | ||
project.yaml |