<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git/ext/mbstring/tests, branch PHP-7.2.29</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/'/>
<entry>
<title>Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)</title>
<updated>2020-01-21T05:43:42+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2020-01-21T05:42:44+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=2bcbc95f033c31b00595ed39f79c3a99b4ed0501'/>
<id>2bcbc95f033c31b00595ed39f79c3a99b4ed0501</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #78609: mb_check_encoding() no longer supports stringable objects</title>
<updated>2019-09-30T10:42:04+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-09-30T09:07:03+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=45db6fa567b65e7ecd49b59527904fd8566ad813'/>
<id>45db6fa567b65e7ecd49b59527904fd8566ad813</id>
<content type='text'>
We apply type juggling for other types than array.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We apply type juggling for other types than array.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix key leaks in mb_convert_encoding()</title>
<updated>2019-04-12T08:36:58+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-04-12T08:36:26+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=3b53d28e607ba60e8a25b1fca8317565eab28b77'/>
<id>3b53d28e607ba60e8a25b1fca8317565eab28b77</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed SKIPIF when --disable-mbregex is used</title>
<updated>2019-03-30T17:28:33+00:00</updated>
<author>
<name>Matteo Beccati</name>
<email>mbeccati@php.net</email>
</author>
<published>2019-03-29T13:09:39+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=0dbb581cf4d7e99cadda368c9edce5a721dc4036'/>
<id>0dbb581cf4d7e99cadda368c9edce5a721dc4036</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.1' into PHP-7.2</title>
<updated>2019-03-28T07:35:22+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-03-28T07:35:22+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=402adc1df13557c805ccafbc97b9e62f829df7e0'/>
<id>402adc1df13557c805ccafbc97b9e62f829df7e0</id>
<content type='text'>
* PHP-7.1:
  Validate subject encoding in mb_split and mb_ereg_match
  Validate pattern against mbregex encoding
  SQLite3: add DEFENSIVE config for SQLite &gt;= 3.26.0 as a mitigation strategy against potential security flaws
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.1:
  Validate subject encoding in mb_split and mb_ereg_match
  Validate pattern against mbregex encoding
  SQLite3: add DEFENSIVE config for SQLite &gt;= 3.26.0 as a mitigation strategy against potential security flaws
</pre>
</div>
</content>
</entry>
<entry>
<title>Validate subject encoding in mb_split and mb_ereg_match</title>
<updated>2019-03-28T06:20:27+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-02-11T11:31:59+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=0ecac37c40a27ffbd59f34b5920735ee0b7f994c'/>
<id>0ecac37c40a27ffbd59f34b5920735ee0b7f994c</id>
<content type='text'>
We were already validating the subject encoding in most functions,
but not these two.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We were already validating the subject encoding in most functions,
but not these two.
</pre>
</div>
</content>
</entry>
<entry>
<title>Validate pattern against mbregex encoding</title>
<updated>2019-03-28T06:19:46+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-02-11T11:10:40+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=40fe50daf6069f73d0be43d8fcd7d5953053c10d'/>
<id>40fe50daf6069f73d0be43d8fcd7d5953053c10d</id>
<content type='text'>
Oniguruma does not consistently perform this validation itself (at least
on older versions), so make sure we check pattern encoding validity on the
PHP side.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Oniguruma does not consistently perform this validation itself (at least
on older versions), so make sure we check pattern encoding validity on the
PHP side.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed bug #77454</title>
<updated>2019-01-14T09:22:48+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-01-14T09:21:41+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=3ad0ebdf5cdc6dbe077685907d012eaeac7ea6e4'/>
<id>3ad0ebdf5cdc6dbe077685907d012eaeac7ea6e4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.1' into PHP-7.2</title>
<updated>2019-01-07T07:34:26+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-01-07T07:34:02+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=cfe77ea543ac01a151e56a6ea1de585a31f948fb'/>
<id>cfe77ea543ac01a151e56a6ea1de585a31f948fb</id>
<content type='text'>
* PHP-7.1:
  Fix bug #77418 - Heap overflow in utf32be_mbc_to_code
  Add NEWS
  [ci skip] Add NEWS
  Fix more issues with encodilng length
  Fix #77270: imagecolormatch Out Of Bounds Write on Heap
  Fix bug #77380  (Global out of bounds read in xmlrpc base64 code)
  Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
  Fix bug #77370 - check that we do not read past buffer end when parsing multibytes
  Fix #77269: Potential unsigned underflow in gdImageScale
  Fix bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext)
  Fix bug #77242 (heap out of bounds read in xmlrpc_decode())
  Regenerate certs for openssl tests
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.1:
  Fix bug #77418 - Heap overflow in utf32be_mbc_to_code
  Add NEWS
  [ci skip] Add NEWS
  Fix more issues with encodilng length
  Fix #77270: imagecolormatch Out Of Bounds Write on Heap
  Fix bug #77380  (Global out of bounds read in xmlrpc base64 code)
  Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
  Fix bug #77370 - check that we do not read past buffer end when parsing multibytes
  Fix #77269: Potential unsigned underflow in gdImageScale
  Fix bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext)
  Fix bug #77242 (heap out of bounds read in xmlrpc_decode())
  Regenerate certs for openssl tests
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-5.6' into PHP-7.1</title>
<updated>2019-01-07T07:33:34+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-01-07T07:32:36+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/php-git.git/commit/?id=1afebfb3faabafa7f8a28cf9351e86dd423a10ec'/>
<id>1afebfb3faabafa7f8a28cf9351e86dd423a10ec</id>
<content type='text'>
* PHP-5.6:
  Fix bug #77418 - Heap overflow in utf32be_mbc_to_code
  [ci skip] Add NEWS
  Fix more issues with encodilng length
  Fix #77270: imagecolormatch Out Of Bounds Write on Heap
  Fix bug #77380  (Global out of bounds read in xmlrpc base64 code)
  Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
  Fix bug #77370 - check that we do not read past buffer end when parsing multibytes
  Fix #77269: Potential unsigned underflow in gdImageScale
  Fix bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext)
  Fix bug #77242 (heap out of bounds read in xmlrpc_decode())
  Regenerate certs for openssl tests
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-5.6:
  Fix bug #77418 - Heap overflow in utf32be_mbc_to_code
  [ci skip] Add NEWS
  Fix more issues with encodilng length
  Fix #77270: imagecolormatch Out Of Bounds Write on Heap
  Fix bug #77380  (Global out of bounds read in xmlrpc base64 code)
  Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
  Fix bug #77370 - check that we do not read past buffer end when parsing multibytes
  Fix #77269: Potential unsigned underflow in gdImageScale
  Fix bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext)
  Fix bug #77242 (heap out of bounds read in xmlrpc_decode())
  Regenerate certs for openssl tests
</pre>
</div>
</content>
</entry>
</feed>
