github.com/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf

Preview meta tags from the github.com website.

Linked Hostnames

8

Thumbnail

Search Engine Appearance

Google

https://github.com/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf

Tests: Add a fuzzing target for the multithreaded .xz decoder · tukaani-project/xz@48440e2

XZ Utils. Contribute to tukaani-project/xz development by creating an account on GitHub.



Bing

Tests: Add a fuzzing target for the multithreaded .xz decoder · tukaani-project/xz@48440e2

https://github.com/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf

XZ Utils. Contribute to tukaani-project/xz development by creating an account on GitHub.



DuckDuckGo

https://github.com/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf

Tests: Add a fuzzing target for the multithreaded .xz decoder · tukaani-project/xz@48440e2

XZ Utils. Contribute to tukaani-project/xz development by creating an account on GitHub.

  • General Meta Tags

    47
    • title
      Tests: Add a fuzzing target for the multithreaded .xz decoder · tukaani-project/xz@48440e2 · GitHub
    • charset
      utf-8
    • route-pattern
      /:user_id/:repository/commit/:name(/*path)
    • route-controller
      commit
    • route-action
      show
  • Open Graph Meta Tags

    10
    • og:image
      https://opengraph.githubassets.com/e21de4c9fc06ff9a3ab75a1da7d2de656e94416ddf654914cc3ee59909fcdf5b/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf
    • og:image:alt
      It doesn't seem possible to trigger the CVE-2025-31115 bug with this fuzzing target at the moment. It's because the code in fuzz_common.h passes the whole input buffer to lzma_code() at once.
    • og:image:width
      1200
    • og:image:height
      600
    • og:site_name
      GitHub
  • Twitter Meta Tags

    5
    • twitter:image
      https://opengraph.githubassets.com/e21de4c9fc06ff9a3ab75a1da7d2de656e94416ddf654914cc3ee59909fcdf5b/tukaani-project/xz/commit/48440e24a25911ae59e8518b67a1e0f6f1c293bf
    • twitter:site
      @github
    • twitter:card
      summary_large_image
    • twitter:title
      Tests: Add a fuzzing target for the multithreaded .xz decoder · tukaani-project/xz@48440e2
    • twitter:description
      It doesn't seem possible to trigger the CVE-2025-31115 bug with this fuzzing target at the moment. It's because the code in fuzz_common.h passes the whole input buffer to lzma_code() at once.
  • Link Tags

    49
    • alternate icon
      https://github.githubassets.com/favicons/favicon.png
    • assets
      https://github.githubassets.com/
    • dns-prefetch
      https://github.githubassets.com
    • dns-prefetch
      https://avatars.githubusercontent.com
    • dns-prefetch
      https://github-cloud.s3.amazonaws.com

Links

69