]>
granicus.if.org Git - php/log
Christoph M. Becker [Mon, 13 Jul 2015 16:34:40 +0000 (18:34 +0200)]
updated NEWS
Christoph M. Becker [Mon, 13 Jul 2015 16:30:33 +0000 (18:30 +0200)]
Fix #70064: imagescale(..., IMG_BICUBIC) leaks memory
A temporary image (tmp_im) is created with gdImageTrueColor() and freed with
gdFree() instead of gdImageDestroy(). Let's fix that.
Christoph M. Becker [Mon, 13 Jul 2015 13:54:57 +0000 (15:54 +0200)]
updated NEWS
Christoph M. Becker [Mon, 13 Jul 2015 13:43:16 +0000 (15:43 +0200)]
Fix #69024: imagescale segfault with palette based image
imagescale(..., IMG_BICUBIC) is not supposed to work with palette images, so we
fix that by converting to true color if necessary. Basically the same fix has
already been applied to the external libgd[1].
[1] <https://github.com/libgd/libgd/commit/
723ea520bed3b5854df87393c687323d3930edf3 >
Christoph M. Becker [Sun, 12 Jul 2015 23:41:46 +0000 (01:41 +0200)]
updated NEWS
Christoph M. Becker [Sun, 12 Jul 2015 23:29:01 +0000 (01:29 +0200)]
Fix #53154: Zero-height rectangle has whiskers
To avoid drawing the corner pixels twice, gdImageRectangle() draws the vertical
lines 2 points shorter than the actual side of the rectangle. However, this
causes "whiskers" for rectangles with height 0. This patch fixes this issue and
at the same time optimizes the algorithm by drawing only a single line for zero
height and zero width rectangles.
Christoph M. Becker [Sun, 12 Jul 2015 21:13:13 +0000 (23:13 +0200)]
updated NEWS
Christoph M. Becker [Sun, 28 Jun 2015 23:36:39 +0000 (01:36 +0200)]
Fix #67447: imagecrop() adds a black line when cropping
A simple one-off error: imagecrop)() copied only width-1 and height-1 pixels.
Christoph M. Becker [Sun, 12 Jul 2015 14:38:23 +0000 (16:38 +0200)]
updated NEWS
Christoph M. Becker [Sun, 12 Jul 2015 14:26:16 +0000 (16:26 +0200)]
Fix #68714: copy 'n paste error
Actually, this is not really a bug fix, but rather a simplification and
optimization in the same vein as has been done with the external libgd, but
going a small step further and joining both for loops.
Christoph M. Becker [Sat, 11 Jul 2015 22:10:56 +0000 (00:10 +0200)]
Added XFAIL test for bug #53640
Christoph M. Becker [Sat, 11 Jul 2015 18:58:50 +0000 (20:58 +0200)]
updated NEWS
Christoph M. Becker [Sat, 11 Jul 2015 18:50:54 +0000 (20:50 +0200)]
Fix #66339: PHP segfaults in imagexbm
The file parameter of the XBM image ZPP is not properly taken into account. If
it is NULL that would result in a segfault, because gdImageXbmCtx() is not
prepared to take a NULL file_name. If it is not NULL the XBM data would be
written to STDOUT, because the stream is not initialized. This patch fixes both
issues.
Christoph M. Becker [Sat, 11 Jul 2015 15:50:42 +0000 (17:50 +0200)]
updated NEWS
Christoph M. Becker [Sat, 11 Jul 2015 15:49:13 +0000 (17:49 +0200)]
Fix #70047: gd_info() doesn't report WebP support
Despite being documented, the array returned by gd_info() doesn't have a 'WebP
Support' key. This patch adds it.
Edgar R. Sandi [Thu, 9 Jul 2015 19:59:26 +0000 (16:59 -0300)]
Adding tests for getprotobyname and getprotobynumber functions
Ferenc Kovacs [Fri, 10 Jul 2015 15:25:44 +0000 (17:25 +0200)]
add missing NEWS entry
Ferenc Kovacs [Fri, 10 Jul 2015 00:30:29 +0000 (02:30 +0200)]
add missing NEWS entry
Ferenc Kovacs [Thu, 9 Jul 2015 18:01:37 +0000 (20:01 +0200)]
move the use-after-free fixes to 5.6.11
Julien Pauli [Wed, 8 Jul 2015 15:00:29 +0000 (17:00 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
5.5.27 release
Conflicts:
main/php_version.h
Julien Pauli [Wed, 8 Jul 2015 14:59:44 +0000 (16:59 +0200)]
5.5.27 release
Xinchen Hui [Wed, 8 Jul 2015 14:34:27 +0000 (22:34 +0800)]
Revert "Fixed invalid read"
I must be confused while switching from master to 5.6
This reverts commit
94957a7091d2d87d3b75c8395a3a11a4fbecaea1 .
Xinchen Hui [Wed, 8 Jul 2015 11:06:49 +0000 (19:06 +0800)]
Fixed invalid read
Xinchen Hui [Wed, 8 Jul 2015 09:14:19 +0000 (17:14 +0800)]
Fixed bug #70012 (Exception lost with nested finally block)
Christoph M. Becker [Tue, 7 Jul 2015 21:35:28 +0000 (23:35 +0200)]
fixed typo in test for bug #66985
Stanislav Malyshev [Tue, 7 Jul 2015 17:12:51 +0000 (10:12 -0700)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
Better fix for bug #69958
update news
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Better fix for bug #69958
Better fix for bug #69958
update news
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Conflicts:
ext/phar/phar_object.c
Stanislav Malyshev [Tue, 7 Jul 2015 17:09:34 +0000 (10:09 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
Better fix for bug #69958
update news
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Conflicts:
ext/mysqlnd/mysqlnd.c
Stanislav Malyshev [Tue, 7 Jul 2015 17:08:37 +0000 (10:08 -0700)]
Merge branch 'PHP-5.5' of git.php.net:php-src into PHP-5.5
* 'PHP-5.5' of git.php.net:php-src:
add missing second argument for ucfirst to the proto
Anatol Belski [Tue, 7 Jul 2015 16:39:33 +0000 (18:39 +0200)]
fix C89 compat
Stanislav Malyshev [Tue, 7 Jul 2015 05:58:28 +0000 (22:58 -0700)]
Better fix for bug #69958
Stanislav Malyshev [Tue, 7 Jul 2015 04:19:42 +0000 (21:19 -0700)]
update news
Stanislav Malyshev [Sun, 5 Jul 2015 07:00:53 +0000 (00:00 -0700)]
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Stanislav Malyshev [Sun, 5 Jul 2015 06:47:48 +0000 (23:47 -0700)]
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Stanislav Malyshev [Sun, 5 Jul 2015 04:01:50 +0000 (21:01 -0700)]
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Julien Pauli [Tue, 7 Jul 2015 14:01:44 +0000 (16:01 +0200)]
Fix test related to
c22da81
Ferenc Kovacs [Tue, 7 Jul 2015 13:49:44 +0000 (15:49 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
add missing second argument for ucfirst to the proto
Ferenc Kovacs [Tue, 7 Jul 2015 13:49:16 +0000 (15:49 +0200)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
add missing second argument for ucfirst to the proto
Ferenc Kovacs [Tue, 7 Jul 2015 13:48:55 +0000 (15:48 +0200)]
add missing second argument for ucfirst to the proto
Xinchen Hui [Tue, 7 Jul 2015 13:37:35 +0000 (21:37 +0800)]
Fixed bug #69972 (Use-after-free vulnerability in sqlite3SafetyCheckSickOrOk())
Xinchen Hui [Tue, 7 Jul 2015 13:25:28 +0000 (21:25 +0800)]
Fixed bug #69970 (Use-after-free vulnerability in spl_recursive_it_move_forward_ex())
Julien Pauli [Mon, 6 Jul 2015 13:46:48 +0000 (15:46 +0200)]
Fixed double ZEND_TICKS opcode generation for declare()
Stanislav Malyshev [Tue, 7 Jul 2015 07:01:42 +0000 (00:01 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
Better fix for bug #69958
Stanislav Malyshev [Tue, 7 Jul 2015 05:58:28 +0000 (22:58 -0700)]
Better fix for bug #69958
Stanislav Malyshev [Tue, 7 Jul 2015 06:03:05 +0000 (23:03 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
Better fix for bug #69958
Stanislav Malyshev [Tue, 7 Jul 2015 05:58:28 +0000 (22:58 -0700)]
Better fix for bug #69958
Stanislav Malyshev [Tue, 7 Jul 2015 04:53:02 +0000 (21:53 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
update news
Stanislav Malyshev [Tue, 7 Jul 2015 04:19:42 +0000 (21:19 -0700)]
update news
Stanislav Malyshev [Tue, 7 Jul 2015 04:52:49 +0000 (21:52 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Conflicts:
ext/mysqlnd/mysqlnd.c
Stanislav Malyshev [Sun, 5 Jul 2015 07:00:53 +0000 (00:00 -0700)]
Fix bug #69669 (mysqlnd is vulnerable to BACKRONYM)
Côme Bernigaud [Mon, 6 Jul 2015 12:54:04 +0000 (14:54 +0200)]
Attempt at falling back on ldap_find_control for Mac OS
Côme Bernigaud [Mon, 6 Jul 2015 12:26:49 +0000 (14:26 +0200)]
Updated README, added test to create LDAP base if missing and ease tests
Dominic [Fri, 19 Jun 2015 10:31:03 +0000 (12:31 +0200)]
Cleaned white spaces in PHP_INI definition of phar
Removes unnecessary white spaces.
Stanislav Malyshev [Sun, 5 Jul 2015 08:01:00 +0000 (01:01 -0700)]
Merge branch 'pull-request/1324' into PHP-5.6
* pull-request/1324:
fix typo, see #68476
Stanislav Malyshev [Sun, 5 Jul 2015 06:47:48 +0000 (23:47 -0700)]
Fix bug #69923 - Buffer overflow and stack smashing error in phar_fix_filepath
Stanislav Malyshev [Sun, 5 Jul 2015 04:01:50 +0000 (21:01 -0700)]
Fix bug #69958 - Segfault in Phar::convertToData on invalid file
Anatol Belski [Fri, 3 Jul 2015 14:21:02 +0000 (16:21 +0200)]
fix backport mistake
in 5.6 it has to be explicitly copied to avoid double free
Christoph M. Becker [Fri, 3 Jul 2015 11:30:39 +0000 (13:30 +0200)]
fixed fix #69975 wrt. ODBCVER < 0x0300
Anatol Belski [Fri, 3 Jul 2015 09:16:02 +0000 (11:16 +0200)]
Edgar R. Sandi [Tue, 30 Jun 2015 01:02:19 +0000 (22:02 -0300)]
Added more tests to improve function coverage
Christoph M. Becker [Thu, 2 Jul 2015 22:23:44 +0000 (00:23 +0200)]
updated NEWS
Christoph M. Becker [Thu, 2 Jul 2015 22:04:50 +0000 (00:04 +0200)]
Fix #69975: PHP segfaults when accessing nvarchar(max) defined columns
The SQL Server Native Client 11.0 and maybe other ODBC drivers report
NVARCHAR(MAX) columns as SQL_WVARCHAR with size 0. This causes too small a
buffer to be emalloc'd, likely causing a segfault in the following. As we don't
know the real size of the column data, we treat such colums as
SQL_WLONGVARCHAR.
The related bug #67437 suggests that some drivers report a size of ~4GB. It is
not certain that this is really the case (there might be some integer overflow
involved, and anyway, there has been no feedback), so we do not cater for this
now. However, it would not be hard to treat all sizes above a certain threshold
in a similar way, i.e. as SQL_WLONGVARCHAR.
Anatol Belski [Mon, 29 Jun 2015 08:12:36 +0000 (10:12 +0200)]
keep LDAP_DEPRECATED in config.w32
Edgar R. Sandi [Mon, 29 Jun 2015 20:34:57 +0000 (17:34 -0300)]
Improved code coverage of explode function
Edgar R. Sandi [Mon, 29 Jun 2015 17:33:21 +0000 (14:33 -0300)]
Added basic and error tests for hex2bin function
Edgar R. Sandi [Mon, 29 Jun 2015 13:05:27 +0000 (10:05 -0300)]
adding several other testing scenarios of code without coverage in stripcslashes function
Edgar R. Sandi [Mon, 29 Jun 2015 12:50:27 +0000 (09:50 -0300)]
adding another testing scenario without coverage in setlocale function
Dmitry Stogov [Mon, 29 Jun 2015 14:45:56 +0000 (17:45 +0300)]
On Windows PHP may be restarted with different set of DSO extensions without SHM reset.
This may make optimisation for entities from DSO extensions inconsistent.
Côme Bernigaud [Mon, 29 Jun 2015 07:31:37 +0000 (09:31 +0200)]
Merge PR about LDAP cleaning by removing deprecated calls
Merge branch 'pull-request/1357' into PHP-5.6
* pull-request/1357:
Putting back deprecated symbols for ldap_sort
Removed deprecated function calls from ldap module
Removed ifdefs of LDAP_API_FEATURE_X_OPENLDAP, fixed a warning
Stanislav Malyshev [Mon, 29 Jun 2015 07:30:55 +0000 (00:30 -0700)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
Move strlen() check to php_mail_detect_multiple_crlf()
Fixed Bug #69874 : Can't set empty additional_headers for mail()
Côme Bernigaud [Mon, 29 Jun 2015 07:07:49 +0000 (09:07 +0200)]
Putting back deprecated symbols for ldap_sort
Stanislav Malyshev [Mon, 29 Jun 2015 03:23:00 +0000 (20:23 -0700)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
Move strlen() check to php_mail_detect_multiple_crlf()
Fixed Bug #69874 : Can't set empty additional_headers for mail()
Stanislav Malyshev [Mon, 29 Jun 2015 01:53:19 +0000 (18:53 -0700)]
Merge branch 'pull-request/1350' into PHP-5.4
* pull-request/1350:
Move strlen() check to php_mail_detect_multiple_crlf()
Fixed Bug #69874 : Can't set empty additional_headers for mail()
Christoph M. Becker [Sat, 27 Jun 2015 18:03:38 +0000 (20:03 +0200)]
updated NEWS
Christoph M. Becker [Sat, 27 Jun 2015 17:47:32 +0000 (19:47 +0200)]
Fixed #69655: php -S changes MKCALENDAR request method to MKCOL
The parsing of the request method in the CLI server has been faulty, so that
several unsupported methods have been recognized as other methods.
Christoph M. Becker [Sat, 27 Jun 2015 13:02:52 +0000 (15:02 +0200)]
added skip condition for powershell requirement of test
Christoph M. Becker [Sat, 27 Jun 2015 12:32:34 +0000 (14:32 +0200)]
updated NEWS
Christoph M. Becker [Mon, 18 May 2015 19:28:22 +0000 (21:28 +0200)]
Fix #64878: 304 responses return Content-Type header
According to RFC 7232 304 responses should not send a Content-Type header,
so the CLI server should comply.
Christoph M. Becker [Fri, 26 Jun 2015 23:08:56 +0000 (01:08 +0200)]
added regression test for bug #69679
DOMDocument::loadHTML refuses to accept NULL bytes.
Christoph M. Becker [Fri, 26 Jun 2015 21:20:22 +0000 (23:20 +0200)]
slightly revised bug69462.phpt
Tomasz Sawicki [Thu, 25 Jun 2015 16:32:01 +0000 (18:32 +0200)]
Test for bug #69462
Test scenario for already fixed bug #69462 with segmentation fault when
SoapVar XML node name was null.
Tjerk Meesters [Thu, 25 Jun 2015 21:31:54 +0000 (05:31 +0800)]
Fixed #69882: OpenSSL error "key values mismatch" after openssl_pkcs12_read with extra certs
Squashed commit of the following:
commit
a64c1d9bc4c129fd946a478bdcb55101e42157b7
Author: Tomasz Sawicki <falundir@gmail.com>
Date: Wed Jun 24 08:49:37 2015 +0200
Fix #69882: OpenSSL error "key values mismatch" after openssl_pkcs12_read with extra certs
The "key values mismatch" error is triggered in openssl_pkcs12_read by
PKCS12_parse, because it uses X509_check_private_key to separate main
certificate (which corresponds to private key) from extra certificates.
Extra certificates usually comes first (p12 contents are reversed as
stack) and X509_check_private_key triggers X509_R_KEY_VALUES_MISMATCH
error.
The fix pops "key values mismatch" error from OpenSSL error stack for
each extra certificate if there are any.
Julien Pauli [Thu, 25 Jun 2015 17:13:20 +0000 (19:13 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
fix unknown size of void error
Anatol Belski [Wed, 17 Jun 2015 21:43:13 +0000 (23:43 +0200)]
fix unknown size of void error
Anatol Belski [Thu, 25 Jun 2015 09:34:04 +0000 (11:34 +0200)]
Ferenc Kovacs [Wed, 24 Jun 2015 22:21:45 +0000 (00:21 +0200)]
5.6.12 next
Julien Pauli [Wed, 24 Jun 2015 08:42:41 +0000 (10:42 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
5.5.28 now - Security Only
Conflicts:
configure.in
main/php_version.h
Julien Pauli [Wed, 24 Jun 2015 08:41:06 +0000 (10:41 +0200)]
5.5.28 now - Security Only
Christoph M. Becker [Tue, 23 Jun 2015 23:42:22 +0000 (01:42 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
Made bug44295-win.phpt locale independent
Christoph M. Becker [Tue, 23 Jun 2015 23:41:33 +0000 (01:41 +0200)]
Made bug44295-win.phpt locale independent
Formerly it failed on non English installations.
Christoph M. Becker [Tue, 23 Jun 2015 22:42:24 +0000 (00:42 +0200)]
updated NEWS
Christoph M. Becker [Tue, 23 Jun 2015 22:32:13 +0000 (00:32 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
updated NEWS
updated NEWS
Fixed bug #69768 (escapeshell*() doesn't cater to !)
bump API version to 6.8
Christoph M. Becker [Tue, 23 Jun 2015 22:31:07 +0000 (00:31 +0200)]
updated NEWS
Christoph M. Becker [Tue, 23 Jun 2015 22:23:39 +0000 (00:23 +0200)]
Merge branch 'PHP-5.4' into PHP-5.5
* PHP-5.4:
updated NEWS
Fixed bug #69768 (escapeshell*() doesn't cater to !)
bump API version to 6.8
Christoph M. Becker [Tue, 23 Jun 2015 22:20:32 +0000 (00:20 +0200)]
updated NEWS
Christoph M. Becker [Tue, 23 Jun 2015 22:15:55 +0000 (00:15 +0200)]
Fixed bug #69768 (escapeshell*() doesn't cater to !)
When delayed variable substitution is enabled (can be set in the
Registry, for instance), !ENV! works similar to %ENV%, and so ! should
be escaped like %.
Christoph M. Becker [Tue, 23 Jun 2015 17:36:59 +0000 (19:36 +0200)]
updated NEWS
Christoph M. Becker [Tue, 23 Jun 2015 17:32:57 +0000 (19:32 +0200)]
Merge branch 'PHP-5.5' into PHP-5.6
* PHP-5.5:
updated NEWS
Fixed Bug #53823 (preg_replace: * qualifier on unicode replace garbles the string)
Christoph M. Becker [Tue, 23 Jun 2015 17:32:18 +0000 (19:32 +0200)]
updated NEWS
Christoph M. Becker [Fri, 5 Jun 2015 12:40:03 +0000 (14:40 +0200)]
Fixed Bug #53823 (preg_replace: * qualifier on unicode replace garbles the string)
When advancing after empty matches, php_pcre_match_impl() as well as
php_pcre_replace_impl() always have to advance to the next code point when the
u modifier is given, instead of to the next byte.
Christoph M. Becker [Tue, 23 Jun 2015 15:30:31 +0000 (17:30 +0200)]
Moved NEWS entry for bug #69864 to proper category