breakpad/src
George Burgess IV 4d7cd09800 exploitability: fix buffer overflow
exploitability_linux assumed a 15 byte buffer to always be passed in as
`raw_bytes` for `DisassembleBytes`. This test was passing in a 6 byte
buffer. Make `DisassembleBytes` accept a length.

Bug: b:235999011
Change-Id: I696c66357faa1c7d762c64009864123897f03488
Reviewed-on: https://chromium-review.googlesource.com/c/breakpad/breakpad/+/3756170
Reviewed-by: Mike Frysinger <vapier@chromium.org>
2022-07-11 20:20:05 +00:00
..
build Fix MSVC build on 64-bit 2017-09-25 07:10:11 +00:00
client Reland "Support PE modules in core files when running core2md" 2022-06-08 19:59:24 +00:00
common dwarf2reader: include <algorithm> 2022-07-03 17:19:35 +00:00
google_breakpad [breakpad] Add MINIDUMP_THREAD_NAME_LIST support 2022-06-07 18:42:06 +00:00
processor exploitability: fix buffer overflow 2022-07-11 20:20:05 +00:00
third_party List missing 64-bit arches in the bundled curl 2017-11-13 19:50:29 +00:00
tools [breakpad] Add MINIDUMP_THREAD_NAME_LIST support 2022-06-07 18:42:06 +00:00
breakpad_googletest_includes.h test: allow use of system gmock/gtest libs 2016-01-25 19:27:56 -05:00
config.h.in Do not build core_handler unless memfd_create is available 2020-12-21 22:07:02 +00:00