1
0
mirror of https://github.com/php/php-src.git synced 2026-04-10 17:43:13 +02:00
Files
archived-php-src/ext
Tim Düsterhus f2e8c5da90 unserialize: Strictly check for :{ at object start (#10214)
* unserialize: Strictly check for `:{` at object start

* unserialize: Update CVE tests

It's unlikely that the object syntax error contributed to the actual CVE. The
CVE is rather caused by the incorrect object serialization data of the `C`
format. Add a second string without such a syntax error to ensure that path is
still executed as well to ensure the CVE is absent.

* Fix test expectation in gmp/tests/bug74670.phpt

No changes to the input required, because the test actually is intended to
verify the behavior for a missing `}`, it's just that the report position changed.

* NEWS

* UPGRADING
2023-01-12 19:55:54 +01:00
..
2022-06-25 07:40:19 +01:00
2022-10-27 14:42:17 +01:00
2023-01-10 15:16:32 +00:00
2022-10-27 14:42:17 +01:00
2022-11-03 14:37:59 +01:00
2022-10-24 15:02:55 +02:00
2023-01-09 14:09:43 +01:00
2022-12-16 14:37:39 +01:00
2022-12-09 16:09:23 +01:00
2022-09-27 23:32:37 +02:00
2022-09-06 10:34:10 +01:00
2022-11-13 11:05:28 +01:00
2022-12-18 23:21:25 -07:00
2022-08-26 14:59:59 +02:00
2022-06-09 13:42:45 +02:00
2022-09-27 18:45:54 +02:00
2023-01-02 16:55:03 +00:00
2022-10-13 16:08:34 +02:00