Junwha Hong
Junwha Hong
 Hi all, I'm trying to run this benchmark in Ubuntu 22.04 with godot(4.3.dev.custom_build.89cc635c0) compiled with Clang 15.0.6. However, I can not open the benchmark using either the command line...
Dear @cbbarber, I found a vulnerability from qhull and reported it to [email protected], but this project seems not actively in maintenance. So do you want me to patch the bug...
Hi, I'm currently trying to experiment with SABER, and I realized that it can not deal with UAF as mentioned in #481 But I thought it is weird because I...
Hi all, Sorry for burdening you with a lot of bug reports. we found buffer overflow at mp_stream_rw. ## Summary - **OS**: Ubuntu 22.04 - **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd - **port**: unix...
https://www.instructables.com/Custom-Large-Font-For-16x2-LCDs/
Hi all, I'm Junwha Hong, from the research group S2Lab in UNIST, we found a buffer-overflow from rapidjson by our custom tool, and patched it. the detailed information is as...
Hi, I found a use-after-free bug in the unit test whose root cause can be critical. ### Description The problem is that PushUnsafe in `include/rapidjson/internal/stack.h` doesn't flush the remained data...
Hi, we found an incorrect use of Clear API of the allocator, which leads to Use-After-Free in schematest. At test/perftest/schematest.cpp:208, the validator is constructed with validatorAllocator, and the chunks allocated...
**Describe the bug** Sparse matrix is constructed with incorrect num_triplets, which leads to buffer-overflow read. **To Reproduce** PoC was modified from `test_sparse_matrix.py` ```py import taichi as ti arch = ti.cpu...