<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git/sapi/fuzzer, branch master</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/'/>
<entry>
<title>Free static variables in execute fuzzer</title>
<updated>2021-03-26T10:59:14+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2021-03-26T10:58:36+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=5da23eb46c5b7d2840ac775b2b42bc4dd1bbbaae'/>
<id>5da23eb46c5b7d2840ac775b2b42bc4dd1bbbaae</id>
<content type='text'>
Fixes a leak in the seed corpus.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fixes a leak in the seed corpus.
</pre>
</div>
</content>
</entry>
<entry>
<title>Change Zend Stream API to use zend_string* instead of char*.</title>
<updated>2021-03-16T17:31:36+00:00</updated>
<author>
<name>Dmitry Stogov</name>
<email>dmitry@zend.com</email>
</author>
<published>2021-03-16T17:31:36+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=c732ab400af92c54eee47c487a56009f1d79dd5d'/>
<id>c732ab400af92c54eee47c487a56009f1d79dd5d</id>
<content type='text'>
This allows to eliminate re-calculation of string lenght and hash value.
See the detailed list of changes in UPGRADING.INTERNALS.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows to eliminate re-calculation of string lenght and hash value.
See the detailed list of changes in UPGRADING.INTERNALS.
</pre>
</div>
</content>
</entry>
<entry>
<title>Replace zend_bool uses with bool</title>
<updated>2021-01-15T11:33:06+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2021-01-15T11:30:54+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=3e01f5afb1b52fe26a956190296de0192eedeec1'/>
<id>3e01f5afb1b52fe26a956190296de0192eedeec1</id>
<content type='text'>
We're starting to see a mix between uses of zend_bool and bool.
Replace all usages with the standard bool type everywhere.

Of course, zend_bool is retained as an alias.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We're starting to see a mix between uses of zend_bool and bool.
Replace all usages with the standard bool type everywhere.

Of course, zend_bool is retained as an alias.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fuzzer: Gracefully handle hashes that cannot be serialized</title>
<updated>2021-01-11T14:45:43+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2021-01-11T14:44:42+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=3b542021e471c2927e5225fa0680be4dbbc1da60'/>
<id>3b542021e471c2927e5225fa0680be4dbbc1da60</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add additional entries to unserialize corpus</title>
<updated>2020-11-30T13:32:07+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-11-30T13:32:07+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=4643c0aac5fa85e2959a1b2d2e57090ac4d6d739'/>
<id>4643c0aac5fa85e2959a1b2d2e57090ac4d6d739</id>
<content type='text'>
These are useful to seed typed property fuzzing.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
These are useful to seed typed property fuzzing.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix mbstring fuzzer</title>
<updated>2020-09-11T16:35:16+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-09-11T16:34:15+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=99a68775bf937adc062a5a107cdf6340c3077b66'/>
<id>99a68775bf937adc062a5a107cdf6340c3077b66</id>
<content type='text'>
mb_ereg can throw now, so we need a dummy frame and need to
free the exception afterwards.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
mb_ereg can throw now, so we need a dummy frame and need to
free the exception afterwards.
</pre>
</div>
</content>
</entry>
<entry>
<title>Reduce input size limit in execute fuzzer</title>
<updated>2020-09-07T20:58:34+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-09-07T20:57:09+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=af0ba0b2d3641d3372aebbe471c4b194dc3f3440'/>
<id>af0ba0b2d3641d3372aebbe471c4b194dc3f3440</id>
<content type='text'>
We only have 4 Zend test cases &gt; 8k. Large inputs tend to just
make things slower.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We only have 4 Zend test cases &gt; 8k. Large inputs tend to just
make things slower.
</pre>
</div>
</content>
</entry>
<entry>
<title>Avoid large eval inputs in fuzzer</title>
<updated>2020-09-07T09:53:01+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-09-07T09:53:01+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=9475bcbef77c5e87d0381943ab0194f720b1323c'/>
<id>9475bcbef77c5e87d0381943ab0194f720b1323c</id>
<content type='text'>
While we limit the size of the main compilation input, the size
of eval inputs was not limited. This could result in stack
overflows, e.g. oss-fuzz #25464.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
While we limit the size of the main compilation input, the size
of eval inputs was not limited. This could result in stack
overflows, e.g. oss-fuzz #25464.
</pre>
</div>
</content>
</entry>
<entry>
<title>Disable InfiniteIterator class while fuzzing</title>
<updated>2020-09-04T08:59:55+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-09-04T08:15:55+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=2f95af996fc5dee9e445faa10473cdfcc1bc7640'/>
<id>2f95af996fc5dee9e445faa10473cdfcc1bc7640</id>
<content type='text'>
The combination of LimitIterator and InfiniteIterator can cause
effectively infinite loops that bypass the executor step limit.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The combination of LimitIterator and InfiniteIterator can cause
effectively infinite loops that bypass the executor step limit.
</pre>
</div>
</content>
</entry>
<entry>
<title>Extend function blacklist in execute fuzzer</title>
<updated>2020-09-02T15:30:19+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2020-09-02T15:05:18+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/php-git.git/commit/?id=05cd31ef6422d6947b9a1e8de3a39611f6458210'/>
<id>05cd31ef6422d6947b9a1e8de3a39611f6458210</id>
<content type='text'>
Add pfsockopen and stream_socket_server.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add pfsockopen and stream_socket_server.
</pre>
</div>
</content>
</entry>
</feed>
