1
0
mirror of https://github.com/php/php-src.git synced 2026-04-24 16:38:25 +02:00
Files
archived-php-src/ext/standard/tests/serialize
Tim Düsterhus f2e8c5da90 unserialize: Strictly check for :{ at object start (#10214)
* unserialize: Strictly check for `:{` at object start

* unserialize: Update CVE tests

It's unlikely that the object syntax error contributed to the actual CVE. The
CVE is rather caused by the incorrect object serialization data of the `C`
format. Add a second string without such a syntax error to ensure that path is
still executed as well to ensure the CVE is absent.

* Fix test expectation in gmp/tests/bug74670.phpt

No changes to the input required, because the test actually is intended to
verify the behavior for a missing `}`, it's just that the report position changed.

* NEWS

* UPGRADING
2023-01-12 19:55:54 +01:00
..
2019-04-09 17:27:02 +02:00
2021-11-26 14:10:11 +01:00
2019-11-07 21:31:47 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2019-11-07 21:31:47 +01:00
2020-09-18 14:28:32 +02:00
2020-02-03 22:52:20 +01:00
2020-09-18 14:28:32 +02:00
2019-11-07 21:31:47 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2019-11-07 21:31:47 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2020-02-03 22:52:20 +01:00
2021-07-30 16:13:05 +02:00
2020-02-03 22:52:20 +01:00
2019-11-07 21:31:47 +01:00
2017-09-11 12:38:20 +02:00
2017-08-12 13:11:35 +02:00
2021-06-18 18:09:27 +01:00
2020-09-18 14:28:32 +02:00
2020-02-03 22:52:20 +01:00