summaryrefslogtreecommitdiff
path: root/decompress.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Prepare for 1.0.7 release.bzip2-1.0.7Mark Wielaard2019-06-271-1/+1
|
* Change a magic number (6) for a constant (BZ_N_GROUPS).Federico Mena Quintero2019-06-241-1/+1
| | | | decompress.c (BZ2_decompress): Check nGroups against BZ_N_GROUPS.
* Make sure nSelectors is not out of rangeAlbert Astals Cid2019-06-241-1/+1
| | | | | | | | | | | | | | nSelectors is used in a loop from 0 to nSelectors to access selectorMtf which is UChar selectorMtf[BZ_MAX_SELECTORS]; so if nSelectors is bigger than BZ_MAX_SELECTORS it'll do an invalid memory access Fixes out of bounds access discovered while fuzzying karchive This was reported as CVE-2019-12900 BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
* Change Julian's email address to jseward@acm.orgMark Wielaard2019-03-301-1/+1
|
* bzip2-1.0.6bzip2-1.0.6Julian Seward2010-09-061-2/+22
|
* bzip2-1.0.5bzip2-1.0.5Julian Seward2007-12-101-2/+2
|
* bzip2-1.0.4bzip2-1.0.4Julian Seward2006-12-201-53/+13
|
* bzip2-1.0.3bzip2-1.0.3Julian Seward2005-02-151-7/+13
|
* bzip2-1.0.2bzip2-1.0.2Julian Seward2001-12-301-7/+7
|
* bzip2-1.0.1bzip2-1.0.1Julian Seward2000-06-241-10/+34
|
* bzip2-0.9.5dbzip2-0.9.5dJulian Seward1999-09-041-4/+4
|
* bzip2-0.9.0cbzip2-0.9.0cJulian Seward1998-08-231-0/+636