Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix missing type checks in various functions | Stanislav Malyshev | 2014-07-31 | 4 | -9/+22 |
| | |||||
* | Fix bug #67492: unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion | Stanislav Malyshev | 2014-07-18 | 3 | -5/+8 |
| | | | | | | Conflicts: ext/spl/spl_array.c ext/spl/tests/SplObjectStorage_unserialize_bad.phpt | ||||
* | Fixed bug #67359 (Segfault in recursiveDirectoryIterator) | Xinchen Hui | 2014-07-18 | 3 | -0/+32 |
| | |||||
* | Fix bug #66127 (Segmentation fault with ArrayObject unset) | Stanislav Malyshev | 2014-07-18 | 3 | -1/+28 |
| | |||||
* | Fix test - because of big #67397 we don't allow overlong locales anymore | Stanislav Malyshev | 2014-07-18 | 1 | -3/+4 |
| | |||||
* | Fix bug #67397 (Buffer overflow in ↵ | Stanislav Malyshev | 2014-07-18 | 2 | -1/+30 |
| | | | | locale_get_display_name->uloc_getDisplayName (libicu 4.8.1)) | ||||
* | Fix bug #67349: Locale::parseLocale Double Free | Stanislav Malyshev | 2014-07-18 | 2 | -5/+8 |
| | |||||
* | Fixed bug #67399 (putenv with empty variable may lead to crash) | Stanislav Malyshev | 2014-07-18 | 2 | -55/+63 |
| | | | | | Conflicts: ext/standard/basic_functions.c | ||||
* | Fixed Bug #67413 fileinfo: cdf_read_property_info insufficient boundary chec | Remi Collet | 2014-07-18 | 1 | -1/+5 |
| | | | | | | | Upstream: https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d Adapted for C standard. | ||||
* | Bug #67412 fileinfo: cdf_count_chain insufficient boundary check | Remi Collet | 2014-07-18 | 1 | -3/+4 |
| | | | | | Upstream: https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382 | ||||
* | Fixed Bug #67411 fileinfo: cdf_check_stream_offset insufficient boundary check | Remi Collet | 2014-07-18 | 1 | -2/+4 |
| | | | | | | | | Upstream: https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67 Conflicts: ext/fileinfo/libmagic/cdf.c | ||||
* | Fixed Bug #67410 fileinfo: mconvert incorrect handling of truncated pascal ↵ | Remi Collet | 2014-07-18 | 1 | -3/+11 |
| | | | | | | | string size Upstream https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | ||||
* | Fix bug #67498 - phpinfo() Type Confusion Information Leak Vulnerability | Stanislav Malyshev | 2014-07-18 | 2 | -4/+19 |
| | |||||
* | Fix bug #67326 fileinfo: cdf_read_short_sector insufficient boundary check | Remi Collet | 2014-07-18 | 1 | -2/+2 |
| | | | | | Upstream fix https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391.patch Only revelant part applied | ||||
* | fix bug #67253: timelib_meridian_with_check out-of-bounds read | Stanislav Malyshev | 2014-07-18 | 4 | -101/+151 |
| | | | | | Conflicts: ext/date/lib/parse_date.c | ||||
* | Fix bug #67252: convert_uudecode out-of-bounds read | Stanislav Malyshev | 2014-07-18 | 2 | -0/+16 |
| | |||||
* | Fix bug #67250 (iptcparse out-of-bounds read) | Stanislav Malyshev | 2014-07-18 | 2 | -0/+11 |
| | |||||
* | Fix bug #67247 spl_fixedarray_resize integer overflow | Stanislav Malyshev | 2014-07-18 | 2 | -1/+14 |
| | |||||
* | Fix bug #67328 (fileinfo: numerous file_printf calls resulting in ↵ | Stanislav Malyshev | 2014-07-18 | 1 | -12/+4 |
| | | | | | | performance degradation) Upstream patch: https://github.com/file/file/commit/b8acc83781d5a24cc5101e525d15efe0482c280d | ||||
* | Fix bug #67327: fileinfo: CDF infinite loop in nelements DoS | Stanislav Malyshev | 2014-07-18 | 1 | -1/+7 |
| | | | | Upstream fix: https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0 | ||||
* | backport this piece from 5.6, related to the #66307 fix | Anatol Belski | 2014-07-18 | 1 | -1/+2 |
| | | | | | Conflicts: ext/fileinfo/libmagic/readcdf.c | ||||
* | Fixed bug #66307 Fileinfo crashes with powerpoint files | Anatol Belski | 2014-07-18 | 3 | -2/+7 |
| | | | | | | Conflicts: ext/fileinfo/libmagic/readcdf.c ext/fileinfo/tests/finfo_file_002.phpt | ||||
* | Fixed bug #66060 (Heap buffer over-read in DateInterval) | Remi Collet | 2014-07-18 | 2 | -2/+2 |
| | | | | | Conflicts: ext/date/lib/parse_iso_intervals.c | ||||
* | Fix bug #65873 - Integer overflow in exif_read_data() | Stanislav Malyshev | 2014-07-18 | 1 | -1/+6 |
| | |||||
* | Fix bug #67251 - date_parse_from_format out-of-bounds read | Stanislav Malyshev | 2014-06-15 | 3 | -2/+48 |
| | | | | | | Conflicts: ext/date/lib/parse_date.c ext/date/lib/parse_date.re | ||||
* | Fix bug #67249: printf out-of-bounds read | Stanislav Malyshev | 2014-06-13 | 2 | -2/+12 |
| | |||||
* | Fix potential segfault in dns_get_record() | Sara Golemon | 2014-06-13 | 1 | -0/+4 |
| | | | | | | If the remote sends us a packet with a malformed TXT record, we could end up trying to over-consume the packet and wander off into overruns. | ||||
* | fix typo in ODBC code | Stanislav Malyshev | 2014-05-18 | 1 | -1/+1 |
| | |||||
* | Revert "Fix #62479: Some chars not parsed in passwords" | Will Fitch | 2014-01-19 | 2 | -85/+2 |
| | | | | This reverts commit e6bb90c66a5306f3db7ca38206b27685177a65cc. | ||||
* | Fix #62479: Some chars not parsed in passwords | Will Fitch | 2014-01-18 | 2 | -2/+85 |
| | | | | | This fixes an issue where backslashes and spaces aren't correctly parsed for passwords. | ||||
* | fix dir separator in cve-2013-6420 test | Anatol Belski | 2013-12-11 | 1 | -1/+1 |
| | |||||
* | Fix CVE-2013-6420 - memory corruption in openssl_x509_parse | Stanislav Malyshev | 2013-12-10 | 3 | -4/+61 |
| | |||||
* | fix using wrong buffer pointer | Stanislav Malyshev | 2013-08-19 | 1 | -0/+1 |
| | |||||
* | Fix CVE-2013-4073 - handling of certs with null bytes | Stanislav Malyshev | 2013-08-13 | 3 | -2/+131 |
| | |||||
* | add test for bug #65236 | Johannes Schlüter | 2013-07-10 | 1 | -0/+15 |
| | |||||
* | truncate results at depth of 255 to prevent corruption | Rob Richards | 2013-07-06 | 1 | -40/+50 |
| | |||||
* | ensure the error_reporting level to get expected notice | Anatol Belski | 2013-06-12 | 1 | -0/+2 |
| | |||||
* | fixed tests | Anatol Belski | 2013-06-11 | 2 | -4/+4 |
| | |||||
* | missing tests for bug #53437 | Anatol Belski | 2013-06-11 | 5 | -0/+251 |
| | |||||
* | Backported the fix for bug #53437 | Anatol Belski | 2013-06-10 | 11 | -40/+694 |
| | |||||
* | Fixed bug #64997 (Segfault while using RecursiveIteratorIterator on 64-bits ↵ | Xinchen Hui | 2013-06-09 | 1 | -6/+13 |
| | | | | systems) | ||||
* | Fixed bug #64934 Apache2 TS crash with get_browser() | Anatol Belski | 2013-06-06 | 1 | -4/+17 |
| | | | | | | In favour of reading the browscap.ini into a true global var only once in MINIT, the price for that is to deep copy the any data from it. | ||||
* | fix CVE-2013-2110 - use correct formula to calculate string size | Stanislav Malyshev | 2013-06-04 | 2 | -1/+13 |
| | |||||
* | Clean up leftover test files | Matteo Beccati | 2013-06-02 | 1 | -3/+5 |
| | |||||
* | Fixed bug #64609 (pg_convert enum type support) | Matteo Beccati | 2013-06-02 | 2 | -5/+66 |
| | |||||
* | Fixed bug #62857 (bytea test failures) | Matteo Beccati | 2013-06-01 | 4 | -1/+7 |
| | | | | | | | | | | | Postgres 9.1+ test fixes. Tests were failing due to the default standard_conforming_strings GUC being changed to on. Also the pg_escape_bytea test was encoding the data before estabilishing a connection, thus falling back to the old escaping type which isn't properly handled by the backend when using a default configuration. I haven't updated the NEWS file as it's just test fixes. | ||||
* | Slightly edited tests and fix for bug #62024 | Matteo Beccati | 2013-05-31 | 2 | -5/+8 |
| | |||||
* | Fixed bug #62024 (unable to run consecutive prepared querys with null values) | Matheus Degiovani | 2013-05-31 | 2 | -3/+54 |
| | | | | Credits to james@kenjim.com for the patch. | ||||
* | Fixed bug #64037 (wrong value returned when using a negative numeric field ↵ | Matheus Degiovani | 2013-05-31 | 2 | -1/+46 |
| | | | | equal to the scale) | ||||
* | Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error) | Remi Collet | 2013-05-31 | 1 | -1/+1 |
| | | | | | | | | | | There is a lot of call such as: pdo_pgsql_error(dbh, PGRES_FATAL_ERROR, "Copy command failed"); Where the 3rd paramater is a error message string where a sqlstate (5 chars) is expected. This cause a segfault in copy_from.phpt and copy_to.phpt. This is only a sanity check to avoid buffer overflow, but obviously this calls need to be fixed (using NULL or a correct sqlstate). |