Tatsuya Kinoshita
dcbdb679aa
Prevent unintentional integer overflow in Strcat_charp_n
...
Bug-Chromium: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31500
2021-02-28 16:16:08 +09:00
Tatsuya Kinoshita
f37f074cdf
Prevent unintentional integer overflow in Strgrow
...
Bug-Chromium: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31467
2021-02-28 16:16:06 +09:00
Tatsuya Kinoshita
31d0457609
One more fix overflow due to Strgrow
...
Bug-Chromium: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31397
2021-02-27 09:17:07 +09:00
Tatsuya Kinoshita
f29533cc7b
Fix potential overflow due to Str.c
2021-02-26 19:38:51 +09:00
Tatsuya Kinoshita
f0aff94b2b
Fix integer overflow due to Strgrow
...
Bug-Chromium: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31397
2021-02-26 19:38:20 +09:00
Tatsuya Kinoshita
4381dffaa3
Prevent heap-buffer-overflow in Strnew_size()
...
Bug-Debian: https://github.com/tats/w3m/issues/72
2016-12-10 18:18:58 +09:00
Kuang-che Wu
c95a43dc92
Fix potential heap buffer corruption due to Strgrow
...
If Str.length = 5 and area_size = 6, the result of Strgrow is still
area_size = 6. For such case, Strcat_char and Strinsert_char will
overflow one byte.
2016-08-30 09:39:53 +08:00
David Crosby
c162b75317
Use fgetc in while loops, use int instead of char
2015-08-11 21:59:27 +09:00
Richard Quirk
91405c0d06
Strnew_charp and co do not modify the char* input
2015-07-25 15:21:33 +02:00
Tatsuya Kinoshita
8164da9e3e
Check length for Strchop()
2013-08-04 16:27:00 +09:00
Tatsuya Kinoshita
72f72d64a4
Adding upstream version 0.5.1
2011-05-04 16:05:14 +09:00