PHP NEWS
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
-?? ??? 2016, PHP 5.6.28
+?? ??? 2016 PHP 7.0.13
+
+- Core:
+ . Fixed bug #73181 (parse_str() without a second argument leads to crash).
+ (Nikita)
-13 Oct 2016, PHP 5.6.27
+ - Standard:
+ . Fixed bug #73203 (passing additional_parameters causes mail to fail). (cmb)
+
+13 Oct 2016 PHP 7.0.12
- Core:
+ . Fixed bug #73067 (__debugInfo crashes when throwing an exception).
+ (Laruence)
. Fixed bug #73025 (Heap Buffer Overflow in virtual_popen of
zend_virtual_cwd.c). (cmb)
- . Fixed bug #73058 (crypt broken when salt is 'too' long). (Anatol)
. Fixed bug #72703 (Out of bounds global memory read in BF_crypt triggered by
password_verify). (Anatol)
+ . Fixed bug #73058 (crypt broken when salt is 'too' long). (Anatol)
+ . Fixed bug #69579 (Invalid free in extension trait). (John Boehr)
+ . Fixed bug #73156 (segfault on undefined function). (Dmitry)
+ . Fixed bug #73163 (PHP hangs if error handler throws while accessing undef
+ const in default value). (Nikita)
+ . Fixed bug #73172 (parse error: Invalid numeric literal). (Nikita, Anatol)
+
+- COM:
+ . Fixed bug #73126 (Cannot pass parameter 1 by reference). (Anatol)
- Filter:
. Fixed bug #72972 (Bad filter for the flags FILTER_FLAG_NO_RES_RANGE and
}
}
- cmd[y] = '\0';
+ ZSTR_VAL(cmd)[y] = '\0';
- if (y - 1 > cmd_max_len) {
+ if (y > cmd_max_len + 1) {
- php_error_docref(NULL TSRMLS_CC, E_ERROR, "Escaped command exceeds the allowed length of %d bytes", cmd_max_len);
- efree(cmd);
- return NULL;
+ php_error_docref(NULL, E_ERROR, "Escaped command exceeds the allowed length of %d bytes", cmd_max_len);
+ zend_string_release(cmd);
+ return ZSTR_EMPTY_ALLOC();
}
if ((estimate - y) > 4096) {
}
}
- cmd[y++] = '"';
+ ZSTR_VAL(cmd)[y++] = '"';
#else
- cmd[y++] = '\'';
+ ZSTR_VAL(cmd)[y++] = '\'';
#endif
- cmd[y] = '\0';
+ ZSTR_VAL(cmd)[y] = '\0';
- if (y - 1 > cmd_max_len) {
+ if (y > cmd_max_len + 1) {
- php_error_docref(NULL TSRMLS_CC, E_ERROR, "Escaped argument exceeds the allowed length of %d bytes", cmd_max_len);
- efree(cmd);
- return NULL;
+ php_error_docref(NULL, E_ERROR, "Escaped argument exceeds the allowed length of %d bytes", cmd_max_len);
+ zend_string_release(cmd);
+ return ZSTR_EMPTY_ALLOC();
}
if ((estimate - y) > 4096) {