MemLock’s Benchmark
Published in Github, 2019
This Benchmark collect some vulnerabilities related to “excessive memory consumption”, which are used in MemLock’s experiment. To trigger these vulnerabilities, the testcase should consume lost of stack memory or heap memory, which can test the ability of fuzzer for generating inputs that consume lost of memory.
The Seeds and POCs are in the folder
If you Cannot reproduce the bug, try to reduce the memory limit. For example:
ulimit -a
to see the information of memory limit.sudo ulimit -s 8192
orsudo ulimit -s 4096
to reduce the stack size.sudo ulimit -m 36700160
to reduce the memory size.