oss-fuzz/projects/lzo
Sami Boukortt 7579d5d84f
lzo: unpoison the working buffer (#7941)
The compression function appears to account for the possibility that the
buffer contains random values, but msan does not realize that.

Initializing the buffer would be another option, but mere unpoisoning
maintains the ability to detect flaws in the way that the library
handles such uninitialized buffers. (Although, arguably, perhaps this
would be better served by separate fuzzing, which would also make such
findings more reproducible.)

This fixes b/154387018.
2022-07-05 15:07:32 +10:00
..
lzo_decompress_target_seeds
Dockerfile
all_lzo_compress.cc lzo: unpoison the working buffer (#7941) 2022-07-05 15:07:32 +10:00
build.sh
lzo_compress_target.c
lzo_compress_target.options
lzo_decompress_target.c
lzo_decompress_target.options
project.yaml