oss-fuzz/projects/lzo
Sami Boukortt 7579d5d84f
lzo: unpoison the working buffer (#7941)
The compression function appears to account for the possibility that the
buffer contains random values, but msan does not realize that.

Initializing the buffer would be another option, but mere unpoisoning
maintains the ability to detect flaws in the way that the library
handles such uninitialized buffers. (Although, arguably, perhaps this
would be better served by separate fuzzing, which would also make such
findings more reproducible.)

This fixes b/154387018.
2022-07-05 15:07:32 +10:00
..
lzo_decompress_target_seeds lzo: Fixes problems with google/oss-fuzz#1900 (#1905) 2018-10-25 07:07:38 -07:00
Dockerfile Update Dockerfiles (#4070) 2020-07-06 13:18:23 -07:00
all_lzo_compress.cc lzo: unpoison the working buffer (#7941) 2022-07-05 15:07:32 +10:00
build.sh Implement a fuzz target for all the compression algorithms in LZO. The fuzzer dynamically switches between algorithms using the FuzzedDataProvider adapter. (#2966) 2019-10-21 11:21:56 -07:00
lzo_compress_target.c Ensure VLA of zero size is never created in LLVMFuzzerTestOneInput(). (#7173) 2022-01-24 22:45:55 +00:00
lzo_compress_target.options lzo: Fixes problems with google/oss-fuzz#1900 (#1905) 2018-10-25 07:07:38 -07:00
lzo_decompress_target.c lzo: Fixes problems with google/oss-fuzz#1900 (#1905) 2018-10-25 07:07:38 -07:00
lzo_decompress_target.options lzo: Fixes problems with google/oss-fuzz#1900 (#1905) 2018-10-25 07:07:38 -07:00
project.yaml [presubmit] Enforce language attribute in project.yaml to be always set. (#3477) 2020-03-10 11:08:01 -07:00