Stanislav Malyshev
3c328f0984
Fix bug #67251 - date_parse_from_format out-of-bounds read
...
Conflicts:
ext/date/lib/parse_date.c
ext/date/lib/parse_date.re
2014-06-15 00:33:24 -07:00
Stanislav Malyshev
d780c2a673
Fix bug #67249 : printf out-of-bounds read
2014-06-13 16:43:56 -07:00
Sara Golemon
d400b74296
Fix potential segfault in dns_get_record()
...
If the remote sends us a packet with a malformed TXT record,
we could end up trying to over-consume the packet and wander
off into overruns.
2014-06-13 16:42:55 -07:00
Remi Collet
08334293f8
Fix bug #67390 insecure temporary file use in the configure script
2014-06-13 16:41:13 -07:00
Stanislav Malyshev
adc070ca99
fix typo in ODBC code
2014-05-18 23:42:30 -07:00
Stanislav Malyshev
8a22540a95
Fix bug #67060 : use default mode of 660
2014-05-11 23:32:35 -07:00
Ferenc Kovacs
4b48b29988
fix the primary qa email address and update the list of available people being able to add moderators to our lists
2014-01-24 16:06:58 +01:00
Will Fitch
8aa93b7f2c
Revert "Fix #62479 : Some chars not parsed in passwords"
...
This reverts commit e6bb90c66a .
2014-01-19 13:02:20 -05:00
Will Fitch
e6bb90c66a
Fix #62479 : Some chars not parsed in passwords
...
This fixes an issue where backslashes and spaces aren't
correctly parsed for passwords.
2014-01-18 19:27:00 -05:00
Julien Pauli
3eb2b1ac40
Updated release process
2013-12-13 13:16:54 +01:00
Anatol Belski
6f739318fd
fix dir separator in cve-2013-6420 test
2013-12-11 13:31:29 +01:00
Stanislav Malyshev
8650bbc8dc
5.3.29-dev
2013-12-10 11:32:11 -08:00
Stanislav Malyshev
c1224573c7
Fix CVE-2013-6420 - memory corruption in openssl_x509_parse
2013-12-10 11:03:49 -08:00
Christopher Jones
32873cd0dd
Merge branch 'PHP-5.3' of https://git.php.net/repository/php-src into PHP-5.3
...
* 'PHP-5.3' of https://git.php.net/repository/php-src :
fix using wrong buffer pointer
2013-08-19 10:53:41 -07:00
Stanislav Malyshev
c1c49d6e39
fix using wrong buffer pointer
2013-08-19 01:02:12 -07:00
Stanislav Malyshev
dcea4ec698
Fix CVE-2013-4073 - handling of certs with null bytes
2013-08-13 22:24:11 -07:00
Christopher Jones
7c9bb87edd
Merge branch 'PHP-5.3' of https://git.php.net/repository/php-src into PHP-5.3
...
# By Johannes Schlüter
# Via Christopher Jones (1) and Johannes Schlüter (1)
* 'PHP-5.3' of https://git.php.net/repository/php-src :
Merge PHP 5.3.27 NEWS
add test for bug #65236
2013-07-22 10:58:52 -07:00
Christopher Jones
e2e002d4ea
Merge branch 'PHP-5.3' of https://git.php.net/repository/php-src into PHP-5.3
...
* 'PHP-5.3' of https://git.php.net/repository/php-src :
Merge PHP 5.3.27 NEWS
add test for bug #65236
2013-07-10 11:13:15 -07:00
Johannes Schlüter
9c4ef50146
Merge PHP 5.3.27 NEWS
2013-07-10 19:45:45 +02:00
Johannes Schlüter
710eee5555
add test for bug #65236
2013-07-10 19:35:18 +02:00
Rob Richards
7d163e8a08
truncate results at depth of 255 to prevent corruption
2013-07-06 07:53:07 -04:00
Nuno Lopes
e964817b24
fix assembly of safe_address() for x86 and x86_64
2013-07-03 18:02:28 -04:00
Sebastian Bergmann
50ac53e1b1
Add bison 2.6.4 to the list of supported versions
2013-07-03 06:36:54 +02:00
Johannes Schlüter
e4ee921b7e
Update git rules (5.5 is stable, 5.3 sec only)
2013-06-20 11:51:21 +02:00
Johannes Schlüter
f0eaa02f6f
This will be PHP 5.3.28
2013-06-19 15:08:02 +02:00
Matteo Beccati
6238dd6f32
Fixed bug #63186 (compile failure on netbsd)
2013-06-14 16:51:54 +02:00
Anatol Belski
cd1b44c4b6
ensure the error_reporting level to get expected notice
2013-06-12 13:13:48 +02:00
Anatol Belski
eccc05fc44
fixed tests
2013-06-11 12:38:49 +02:00
Anatol Belski
f16143f5ac
missing tests for bug #53437
2013-06-11 11:19:57 +02:00
Anatol Belski
18403e496d
missing colon
2013-06-10 19:54:29 +02:00
Anatol Belski
88c2dbe5fc
Backported the fix for bug #53437
2013-06-10 19:48:18 +02:00
Dmitry Stogov
f5f6404260
Fixed test script
2013-06-10 12:53:19 +04:00
Xinchen Hui
75c57122e3
Fixed bug #64997 (Segfault while using RecursiveIteratorIterator on 64-bits systems)
2013-06-09 22:24:48 +08:00
Xinchen Hui
e8f004d542
Fixed bug #64966 (segfault in zend_do_fcall_common_helper_SPEC)
2013-06-09 13:20:40 +08:00
Anatol Belski
1aee7ad636
Fixed bug #64934 Apache2 TS crash with get_browser()
...
In favour of reading the browscap.ini into a true global var
only once in MINIT, the price for that is to deep copy the
any data from it.
2013-06-06 18:49:04 +02:00
Johannes Schlüter
ec3bcbcb5a
Add NEWS for PHP 5.3.26
2013-06-05 16:34:18 +02:00
Xinchen Hui
3c87945c95
Fixed bug #64960 (Segfault in gc_zval_possible_root)
2013-06-05 17:25:00 +08:00
Stanislav Malyshev
93e0d78ec6
fix CVE-2013-2110 - use correct formula to calculate string size
2013-06-04 21:56:33 -07:00
Matteo Beccati
2463e89794
Clean up leftover test files
2013-06-02 13:38:43 +02:00
Matteo Beccati
25aae37229
Fixed bug #64609 (pg_convert enum type support)
2013-06-02 06:29:35 +02:00
Matteo Beccati
79803bebde
Fixed bug #62857 (bytea test failures)
...
Postgres 9.1+ test fixes. Tests were failing due to the default
standard_conforming_strings GUC being changed to on. Also the
pg_escape_bytea test was encoding the data before estabilishing
a connection, thus falling back to the old escaping type which
isn't properly handled by the backend when using a default
configuration.
I haven't updated the NEWS file as it's just test fixes.
2013-06-01 23:15:48 +02:00
Matteo Beccati
598e2690b8
Merge branch 'pull-request/309' into PHP-5.3
2013-05-31 16:26:38 +02:00
Matteo Beccati
bf4a034e3e
NEWS
2013-05-31 16:26:06 +02:00
Matteo Beccati
510498947e
Slightly edited tests and fix for bug #62024
2013-05-31 16:19:58 +02:00
Matheus Degiovani
df6ca450ce
Fixed bug #62024 (unable to run consecutive prepared querys with null values)
...
Credits to james@kenjim.com for the patch.
2013-05-31 14:30:57 +02:00
Matheus Degiovani
65d233f06c
Fixed bug #64037 (wrong value returned when using a negative numeric field equal to the scale)
2013-05-31 14:30:51 +02:00
Remi Collet
1c623e3b07
Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error)
...
There is a lot of call such as:
pdo_pgsql_error(dbh, PGRES_FATAL_ERROR, "Copy command failed");
Where the 3rd paramater is a error message string where a sqlstate (5 chars)
is expected. This cause a segfault in copy_from.phpt and copy_to.phpt.
This is only a sanity check to avoid buffer overflow, but obviously this
calls need to be fixed (using NULL or a correct sqlstate).
2013-05-31 08:39:32 +02:00
Dmitry Stogov
13e5c97ffd
Fixed incorrect argument number
2013-05-29 11:09:55 +04:00
Johannes Schlüter
4cb25d25f1
This will be PHP 5.3.27
2013-05-22 17:13:17 +02:00
Remi Collet
c50cef1dc5
Fixed bug #64895 Integer overflow in SndToJewish
2013-05-22 08:30:50 +02:00