<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ubus/tests/fuzz, branch master</title>
<subtitle>OpenWrt system message/RPC bus</subtitle>
<id>https://git-03.infra.openwrt.org/project/ubus/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/ubus/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/ubus/'/>
<updated>2019-12-19T18:53:25Z</updated>
<entry>
<title>fix blob parsing vulnerability by using blob_parse_untrusted</title>
<updated>2019-12-19T18:53:25Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2019-12-19T10:25:56Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/ubus/commit/?id=a1523d76b016ed46501f61e38ad38999d6c66f52'/>
<id>urn:sha1:a1523d76b016ed46501f61e38ad38999d6c66f52</id>
<content type='text'>
blob_parse expects blobs from trusted inputs, but it can be supplied
with possibly malicious blobs from untrusted inputs as well, which might
lead to undefined behaviour and/or crash of ubus daemon. In order to
prevent such conditions, switch to blob_parse_untrusted which should
hopefully handle such untrusted inputs appropriately.

Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
<entry>
<title>add fuzzer and cram based unit tests</title>
<updated>2019-12-16T22:39:16Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2019-12-12T22:24:15Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/ubus/commit/?id=08f17c87a000cc74551e1539d1916c7bfd84ae68'/>
<id>urn:sha1:08f17c87a000cc74551e1539d1916c7bfd84ae68</id>
<content type='text'>
For improved QA etc.

Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
</feed>
