summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* bump version to RC2v5.12.5-RC2Dominic Hargreaves2012-11-071-0/+1
|
* perldelta for NetBSD fixDominic Hargreaves2012-11-031-6/+10
|
* Upstream pkgsrc patch to support NetBSD 6.*Chris 'BinGOs' Williams2012-11-031-1/+1
| | | | | | From original patch: "NetBSD-6.x is same condition as older releases."
* disarm RC1 bumpDominic Hargreaves2012-11-031-1/+0
|
* bump version to RC1v5.12.5-RC1Dominic Hargreaves2012-11-031-0/+1
|
* update Module::CoreList Changes with new versionDominic Hargreaves2012-11-031-0/+3
|
* add perldelta for Module::CoreListDominic Hargreaves2012-11-031-0/+5
|
* finalise perl5125deltaDominic Hargreaves2012-11-031-175/+24
|
* add perl5.16.2 to perlhistRicardo Signes2012-11-011-0/+1
|
* Add 5.17.5 to perlhistFlorian Ragwitz2012-11-011-0/+1
|
* Add 5.14.3 to perlhistDominic Hargreaves2012-11-011-2/+3
|
* Add 5.17.4 to perlhistFlorian Ragwitz2012-11-011-0/+1
|
* add 5.16.0 sizes and filecounts to perlhistRicardo Signes2012-11-011-26/+27
| | | | | | running and using the output of Porting/perlhist_calculate.pl has not been done regularly, presumably because I had no idea that it existed!
* add 5.14.0 sizes and filecounts to perlhistRicardo Signes2012-11-011-26/+27
| | | | | | running and using the output of Porting/perlhist_calculate.pl has not been done regularly, presumably because I had no idea that it existed!
* Add 5.17.3 to perlhistSteve Hay2012-11-011-0/+1
|
* add perl-5.16.1 to perlhistRicardo Signes2012-11-011-0/+1
|
* correct reference to perl5125delta.podDominic Hargreaves2012-11-011-1/+1
|
* Update Module::CoreList for Encode fixDominic Hargreaves2012-11-011-1/+1
|
* perldelta for Encode security fixDominic Hargreaves2012-11-011-0/+9
|
* Backport the CVE-2011-2939 fix for Encode (cherry picked from commit ↵Florian Ragwitz2012-11-012-2/+5
| | | | | | | 2e8de60ec6c36c8169bd4264125ac5c519ce6920) Conflicts: cpan/Encode/Encode.pm
* Update Module::CoreList for 5.12.5Dominic Hargreaves2012-10-281-3/+633
|
* update Copyright year as it's 2012Dominic Hargreaves2012-10-281-1/+1
|
* Bump the perl version in various places for 5.12.5Dominic Hargreaves2012-10-2820-126/+126
|
* perldelta up to 5ee2604e72cdd836101f279f8f9e89243c7f0097Dominic Hargreaves2012-10-281-2/+13
|
* avoid calling memset with a negative countAndy Dougherty2012-10-101-0/+3
| | | | | | | | | | | Poorly written perl code that allows an attacker to specify the count to perl's 'x' string repeat operator can already cause a memory exhaustion denial-of-service attack. A flaw in versions of perl before 5.15.5 can escalate that into a heap buffer overrun; coupled with versions of glibc before 2.16, it possibly allows the execution of arbitrary code. The flaw addressed to this commit has been assigned identifier CVE-2012-5195.
* be_BY.CP1131 is still broken on Mountain LionRicardo Signes2012-09-301-1/+1
|
* backport perlhist.pod from 5.17.2Tony Cook2012-07-211-12/+84
|
* perldelta for unpack "U*" fixFather Chrysostomos2011-09-081-0/+6
|
* [perl #90160] U* gives ‘U0 mode on an empty string’Father Chrysostomos2011-09-082-2/+6
| | | | | | | This is a regression in 5.10 caused by change 23966/08ca2aa38a29, which added a bit of faulty logic. It was treating U* in the middle of a pack template as equivalent to U0, if the input string was empty. (cherry picked from commit c5333953a555847ef4f1457905bf0f111a79eb72)
* Use _xx versions for B::Concise and charnamesFather Chrysostomos2011-09-082-2/+2
|
* In Glob.xs, use memset() instead of bzero()Nicholas Clark2011-09-071-1/+1
| | | | 3c97495f56fb647c used bzero(), which isn't available on some platforms.
* perldelta entry for File:Glob / CVE-2011-2728 fix.Craig A. Berry2011-09-041-0/+15
|
* Plug segfault in bsd_glob() with unsupported ALTDIRFUNC flag.Craig A. Berry2011-09-043-2/+9
| | | | | | | | | First, disable all the unsupported flags just to make sure they aren't triggering something they shouldn't be. Also, zero the pglob struct before passing to bsd_glob(); it contains function pointers, and it's safest if they are null rather than containing random stack data. Bug reported by Clément Lecigne <clemun@gmail.com>.
* Avoid overflow warning in chop.t.Craig A. Berry2011-09-031-0/+1
| | | | | | It overflows at compile time on 32-bit architectures, so the skip isn't enough. (cherry picked from commit dfae30232f1b277231b0dee813acbeca0b958afd)
* perldelta for B::Concise -tree fixFather Chrysostomos2011-09-031-0/+5
|
* B::Concise version bumpFather Chrysostomos2011-09-031-1/+1
|
* Fix [perl #80632] -MO=Concise,-tree formatReini Urban2011-09-031-1/+1
| | | | | | Some time between 5.8.3 and 5.8.4, the -tree output format started getting extra line breaks. (cherry picked from commit efef081eeab2e6a1f5882c447d1aa3cfb2201e46)
* perldelta for UCD doc fixFather Chrysostomos2011-09-031-0/+5
|
* Unicode::UCD version bumpFather Chrysostomos2011-09-031-1/+1
| | | | | | What we now have here on the maint-5.12 branch is identical to what came with 5.13.3, so there is no need for an in-between version number.
* PATCH: [perl #76502] Fix UCD.pm docKarl Williamson2011-09-031-1/+1
| | | | | | | | Thank you for your bug report. Change <lower> to <upper> as the report showed. Signed-off-by: David Golden <dagolden@cpan.org> (cherry picked from commit d2da20e3713b4c9367aaa821e5bb5b67f33611cd)
* perldelta for (?{...}) error-handlingFather Chrysostomos2011-09-021-0/+5
|
* Fix for RT#2353: catch yyparse() exceptions in (?{...})George Greer2011-09-021-0/+4
| | | | | | | | | | | | Ticket is entitled: "panic: top_env when localizing a lexical variable in qr{(?{...})}" but a better description would be: "(?{...}) does not catch yyparse() exceptions in regex compilation" Changes Perl_sv_compile_2op() to tell doeval() that it must use S_try_yyparse() to catch any exception that yyparse() may throw. (cherry picked from commit 634d6919699655c843f8d8c3ea64922d0403c499)
* perldelta for utf8cache/index() bugFather Chrysostomos2011-09-021-0/+5
|
* Avoid UTF-8 cache panics with offsets beyond the string. Fixes RT #75898.Nicholas Clark2011-09-024-14/+32
| | | | | | | Change S_sv_pos_u2b_forwards() to take a point to the (requested) UTF-8 offset, and return the actual UTF-8 offset for the byte position returned. This ensures that the cache is consistent with reality. (cherry picked from commit 3e2d3818e517e0037c1ab6a482f31d50271f9e27)
* In Perl_sv_pos_u2b_flags and S_sv_pos_u2b_cached, return early for offset 0.Nicholas Clark2011-09-021-1/+6
| | | | | | | 0 Unicode characters are always 0 octets long. Returning early ensures that any offsets we calculate later will always be non-zero. (cherry picked from commit 48f9cf718354a5326f9e9d40d02a063952160024, as this is a prerequisite for 3e2d381)
* In S_sv_pos_u2b_midway, inline the call to S_sv_pos_u2b_forwards.Nicholas Clark2011-09-023-4/+11
| | | | | (cherry picked from commit 503752a16bf16b90ff6c073c4bd5d818e68a2e2a, as this is a prerequisite for 3e2d381)
* perldelta for Carp memory leak fixFather Chrysostomos2011-08-311-0/+6
|
* [perl #97020] Carp (actually caller) leaking memoryFather Chrysostomos2011-08-314-4/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit eff7e72c3 (Detect incomplete caller overrides in Carp) used this little trick for detecting a @DB::args that an overridden caller() failed to set: + @args = \$i; # A sentinal, which no-one else has the address of But there is a bug in caller(). The first time caller tries to write to @DB::args, it calls Perl_init_dbargs first. That function checks whether @DB::args is AvREAL, in case someone has assigned to it, and takes appropriate measures. But caller doesn’t bother calling Perl_init_dbargs more than once. So manually-assigned items in @DB::args would leak, starting with the *second* call to caller. Commit eff7e72c3 triggered that bug, resulting in a regression in Carp, in that it started leaking. eff7e72c3 was backported to 5.12.2 with commit 97705941a4, so in both 5.12 and 5.14 Carp is affected. This bug (the caller bug, not Carp’s triggering thereof) also affects any caller overrides that set @DB::args themselves, if there are alternate calls to the overridden caller and CORE::caller. This commit fixes that by changing the if (!PL_dbargs) condition in pp_caller to if (!PL_dbargs || AvREAL(PL_dbargs)). I.e., if @args is either uninitialised or AvREAL then call Perl_init_dbargs. Perl_init_dbargs also has a bug in it, that this fixes: The array not only needs AvREAL turned off, but also AvREIFY turned on, so that assignments to it that occur after its initialisation turn AvREAL back on again. (In fact, Larry Wall added a comment suggesting this back in perl 5.000.) (cherry-picked from af80dd863acea8450a9f41ae03645f4d69dad091)
* delta entry for strftime memory leak fixFather Chrysostomos2011-08-301-0/+5
|
* RT #73520: POSIX::strftime memory leakTony Cook2011-08-301-1/+1
| | | | | Tested before/after with valgrind. (cherry picked from commit c4bc4aaaeaf5ebf3d6c5758fe61c1f0dd3864b9a)