Searched refs:overflow (Results 1 – 25 of 59) sorted by path
123
75 end of a request. They also provide useful allocation and overflow
11 . Fixed bug #70480 (php_url_parse_ex() buffer overflow read). (Stas)12 . Fixed bug #72513 (Stack-based buffer overflow vulnerability in64 overflow). (CVE-2016-5766) (Pierre)67 in heap overflow). (CVE-2016-5767) (Pierre)167 . Fixed bug #71459 (Integer overflow in iptcembed()). (Stas)353 heap overflow). (CVE-2015-4643) (Max Spelsberg)418 overflow). (CVE-2015-4022) (Stas)628 buffer overflow). (Stas)6875 overflow). (Fixes CVE-2008-2829) (Dmitry)7209 - Fixed integer overflow in str[c]spn(). (Stas)[all …]
42 ZEND_SEND* and ZEND_DO_FCALL* don't need to check for stack overflow
2 Bug #34045 (Buffer overflow with serialized object)
2 GC 023: Root buffer overflow (automatic collection)
2 testing integer overflow (32bit)
2 testing integer overflow (64bit)
433 int overflow; member1117 heap->overflow = 0; in zend_mm_startup_ex()1739 heap->overflow = 0; in zend_mm_shutdown()1756 if (heap->overflow == 0) { in zend_mm_safe_error()1773 heap->overflow = 1; in zend_mm_safe_error()1784 if (heap->overflow == 2) { in zend_mm_safe_error()1802 heap->overflow = 2; in zend_mm_safe_error()2466 unsigned long overflow = 0; in safe_address() local2474 if (UNEXPECTED(overflow)) { in safe_address()2515 unsigned long overflow; in safe_address() local[all …]
927 long overflow; in mul_function() local929 …ZEND_SIGNED_MULTIPLY_LONG(Z_LVAL_P(op1),Z_LVAL_P(op2), Z_LVAL_P(result),Z_DVAL_P(result),overflow); in mul_function()930 Z_TYPE_P(result) = overflow ? IS_DOUBLE : IS_LONG; in mul_function()
771 long overflow; in fast_mul_function() local773 …D_SIGNED_MULTIPLY_LONG(Z_LVAL_P(op1), Z_LVAL_P(op2), Z_LVAL_P(result), Z_DVAL_P(result), overflow); in fast_mul_function()774 Z_TYPE_P(result) = overflow ? IS_DOUBLE : IS_LONG; in fast_mul_function()
2986 # or program results in "error TOC overflow" add -mminimal-toc to5677 # or program results in "error TOC overflow" add -mminimal-toc to
2 Bug #53574 (Integer overflow in SdnToJulian; leads to segfault)
2 Bug #55797: Integer overflow in SdnToGregorian leads to segfault (in optimized builds)
2 Bug #64895: Integer overflow in SndToJewish
12 $d[] = '20800410101010'; // overflow..
2 Bug #60150 (Integer overflow during the parsing of invalid exif header)
2 Integer overflow11 $overflow = "2147483648";16 $overflow = "9223372036854775808";33 test_validation($overflow, "overflow");41 overflow filtered: bool(false)42 overflow is_long: bool(false)43 overflow equal: bool(false)
2 Octal integer overflow
2 Hex integer overflow
2 filter_var() and double overflow/underflow
Completed in 95 milliseconds