From b100d51ba2668f9d3a051531575171a7184dc1c6 Mon Sep 17 00:00:00 2001 From: Nikita Popov Date: Wed, 25 Sep 2019 10:56:27 +0200 Subject: [PATCH] Remove xfail on bug70219.phpt Looks like this is working as it's supposed to, the test expectation just needs to be adjusted. --- ext/standard/tests/serialize/bug70219.phpt | 17 +++-------------- 1 file changed, 3 insertions(+), 14 deletions(-) diff --git a/ext/standard/tests/serialize/bug70219.phpt b/ext/standard/tests/serialize/bug70219.phpt index ddd2f317df..a97caf6c2b 100644 --- a/ext/standard/tests/serialize/bug70219.phpt +++ b/ext/standard/tests/serialize/bug70219.phpt @@ -4,8 +4,6 @@ Bug #70219 Use after free vulnerability in session deserializer ---XFAIL-- -Unfinished merge, needs fix. --FILE-- --EXPECTF-- Warning: session_decode(): Failed to decode session object. Session has been destroyed in %s on line %d -array(2) { - [0]=> - object(obj)#%d (1) { - ["data"]=> - NULL - } - [1]=> - &array(1) { - ["data"]=> - NULL - } -} + +Notice: unserialize(): Error at offset 55 of 56 bytes in %s on line %d +bool(false) -- 2.40.0