<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git, branch php-7.3.14</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/'/>
<entry>
<title>Bump version</title>
<updated>2020-01-21T08:17:45+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-21T08:17:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=4b2854db6fd2fae5a950ae7ce25257ee08cee916'/>
<id>4b2854db6fd2fae5a950ae7ce25257ee08cee916</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.2' into PHP-7.3</title>
<updated>2020-01-21T08:15:37+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2020-01-21T06:22:02+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=a8a6242db7c01bb2d87f29e9b8d5ff3f0f847645'/>
<id>a8a6242db7c01bb2d87f29e9b8d5ff3f0f847645</id>
<content type='text'>
* PHP-7.2:
  Update NEWS
  Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)
  Fix #79099: OOB read in php_strip_tags_ex
  Fix #79091: heap use-after-free in session_create_id()

(cherry picked from commit 25ec7eb3463f34a2be666c6785d1c6b3cc89575e)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.2:
  Update NEWS
  Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)
  Fix #79099: OOB read in php_strip_tags_ex
  Fix #79091: heap use-after-free in session_create_id()

(cherry picked from commit 25ec7eb3463f34a2be666c6785d1c6b3cc89575e)
</pre>
</div>
</content>
</entry>
<entry>
<title>Bump version</title>
<updated>2020-01-07T09:15:39+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-07T09:15:39+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=793d775b043a8e0bdb6f94c2bb42f49170d266cc'/>
<id>793d775b043a8e0bdb6f94c2bb42f49170d266cc</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Revert "Extend CURLFile to support streams"</title>
<updated>2020-01-06T14:31:49+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-06T14:19:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=06e78cad8353d0ff2b8b76fbf93fbc4860debf56'/>
<id>06e78cad8353d0ff2b8b76fbf93fbc4860debf56</id>
<content type='text'>
This reverts commit 17a9f1401aeb35fe1e3657b38102a410d151d42f, because
this commit would break ABI, and also due to bug #79013.
We keep the commit for PHP 7.4+, though.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This reverts commit 17a9f1401aeb35fe1e3657b38102a410d151d42f, because
this commit would break ABI, and also due to bug #79013.
We keep the commit for PHP 7.4+, though.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #54298: Using empty additional_headers adding extraneous CRLF</title>
<updated>2020-01-06T13:47:23+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-05T14:15:09+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=ae2150692a9a2e0878314385d03826f160e6a76a'/>
<id>ae2150692a9a2e0878314385d03826f160e6a76a</id>
<content type='text'>
If the header string is empty, we pass `NULL` to `php_mail()` to avoid
further checks on the string length.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the header string is empty, we pass `NULL` to `php_mail()` to avoid
further checks on the string length.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #79068: gdTransformAffineCopy() changes interpolation method</title>
<updated>2020-01-06T09:36:48+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-06T09:33:47+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=4bec59f1751d9d1e302465b68cceffb8df93a7be'/>
<id>4bec59f1751d9d1e302465b68cceffb8df93a7be</id>
<content type='text'>
We port
&lt;https://github.com/libgd/libgd/commit/9088591eae437358ee5b929adf82865e37e3001e&gt;.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We port
&lt;https://github.com/libgd/libgd/commit/9088591eae437358ee5b929adf82865e37e3001e&gt;.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #79067: gdTransformAffineCopy() may use unitialized values</title>
<updated>2020-01-06T08:35:13+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-01-06T08:35:13+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=2c5860517c4a1f7ebc81ef79858aa5aff5aad76c'/>
<id>2c5860517c4a1f7ebc81ef79858aa5aff5aad76c</id>
<content type='text'>
We port
&lt;https://github.com/libgd/libgd/commit/7a06c1669c563917bc48c464521e3de962ddb4e8&gt;.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We port
&lt;https://github.com/libgd/libgd/commit/7a06c1669c563917bc48c464521e3de962ddb4e8&gt;.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #78808: [LMDB] MDB_MAP_FULL: Environment mapsize limit reached</title>
<updated>2020-01-03T17:49:12+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-11-14T10:21:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=c05a069adfcca56763d5db06afce8801382477a5'/>
<id>c05a069adfcca56763d5db06afce8801382477a5</id>
<content type='text'>
We implement support for a fifth parameter, which allows to specify the
mapsize.  The parameter defaults to zero, in which case the compiled in
default mapsize (usually 1048576) will be used.  The mapsize should be
a multiple of the page size of the OS.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We implement support for a fifth parameter, which allows to specify the
mapsize.  The parameter defaults to zero, in which case the compiled in
default mapsize (usually 1048576) will be used.  The mapsize should be
a multiple of the page size of the OS.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #78538: shmop memory leak</title>
<updated>2020-01-03T17:10:29+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-11-25T13:05:15+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=18172303f41b9891ae4b78b0c6f70d0d47ed539f'/>
<id>18172303f41b9891ae4b78b0c6f70d0d47ed539f</id>
<content type='text'>
If the descriptor's refcount drops to zero, we have to unmap the
respective file view, to avoid leaking memory.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the descriptor's refcount drops to zero, we have to unmap the
respective file view, to avoid leaking memory.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #79015: undefined-behavior in php_date.c</title>
<updated>2020-01-03T13:31:03+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-12-23T13:42:54+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=b48f2625b57f70eea858033e623e6bf13b595e3b'/>
<id>b48f2625b57f70eea858033e623e6bf13b595e3b</id>
<content type='text'>
We check that the given microsecond fraction is in the valid range
[0, 1000000[, and otherwise mark it as invalid.  We also drop the
useless do loop; a plain block is sufficient here.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We check that the given microsecond fraction is in the valid range
[0, 1000000[, and otherwise mark it as invalid.  We also drop the
useless do loop; a plain block is sufficient here.
</pre>
</div>
</content>
</entry>
</feed>
