-
Notifications
You must be signed in to change notification settings - Fork 134
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upstream Project Zero security fixes from OS X #37
Comments
One more spot for |
it seems https://bugs.chromium.org/p/project-zero/issues/detail?id=429&can=1&q=TRE&redir=1 is #45, and maybe shoudl be processed there. 428 and 430 have not been reported here yet. i am not sure which chunks apply to what. |
Your patch for the buffer overflow in the wide character parser (the final hunk of the patch) is incorrect. If you pass in |
This fixes a buffer overflow which was reported in laurikari#37.
Derived from laurikari#37.
Comparing the 10.10.4 and 10.10.5 source to OS X's Libc (on opensource.apple.com) yields the following patch to TRE:
This patch resolves:
which may also affect upstream TRE.
The text was updated successfully, but these errors were encountered: