MemLock’s Benchmark

Published in Github, 2019

This Benchmark collect some vulnerabilities related to “excessive memory consumption”, which are used in MemLock’s experiment. To trigger these vulnerabilities, the testcase should consume lost of stack memory or heap memory, which can test the ability of fuzzer for generating inputs that consume lost of memory.

The Seeds and POCs are in the folder

If you Cannot reproduce the bug, try to reduce the memory limit. For example:

  1. ulimit -a to see the information of memory limit.
  2. sudo ulimit -s 8192 or sudo ulimit -s 4096 to reduce the stack size.
  3. sudo ulimit -m 36700160 to reduce the memory size.

More information here