<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git/ext/mbstring, branch php-7.2.31</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/'/>
<entry>
<title>Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)</title>
<updated>2020-01-21T05:43:42+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2020-01-21T05:42:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=2bcbc95f033c31b00595ed39f79c3a99b4ed0501'/>
<id>2bcbc95f033c31b00595ed39f79c3a99b4ed0501</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #78609: mb_check_encoding() no longer supports stringable objects</title>
<updated>2019-09-30T10:42:04+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-09-30T09:07:03+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=45db6fa567b65e7ecd49b59527904fd8566ad813'/>
<id>45db6fa567b65e7ecd49b59527904fd8566ad813</id>
<content type='text'>
We apply type juggling for other types than array.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We apply type juggling for other types than array.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #78579: mb_decode_numericentity: args number inconsistency</title>
<updated>2019-09-21T14:15:23+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2019-09-21T13:56:06+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=398b3083163ea3571345a235a0b7453394ba0a06'/>
<id>398b3083163ea3571345a235a0b7453394ba0a06</id>
<content type='text'>
mb_decode_numericentity() accepts a fourth optional parameter, which is
unused, however.  Since this parameter doesn't do any harm, and to avoid
the small BC break, we're keeping this parameter for PHP 7, but adjust
the arginfo.

For PHP 8, we will remove this parameter.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
mb_decode_numericentity() accepts a fourth optional parameter, which is
unused, however.  Since this parameter doesn't do any harm, and to avoid
the small BC break, we're keeping this parameter for PHP 7, but adjust
the arginfo.

For PHP 8, we will remove this parameter.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.1' into PHP-7.2</title>
<updated>2019-08-25T06:15:36+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-08-25T06:15:36+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=087cb7bab2bc0b9673545b9559db21ea38832ab3'/>
<id>087cb7bab2bc0b9673545b9559db21ea38832ab3</id>
<content type='text'>
* PHP-7.1:
  Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()
  set version for release
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.1:
  Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()
  set version for release
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()</title>
<updated>2019-08-25T06:11:45+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-08-25T06:11:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=1258303e66d8dede4f02347334b9f6576e98a21b'/>
<id>1258303e66d8dede4f02347334b9f6576e98a21b</id>
<content type='text'>
Backport from https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Backport from https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix key leaks in mb_convert_encoding()</title>
<updated>2019-04-12T08:36:58+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-04-12T08:36:26+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=3b53d28e607ba60e8a25b1fca8317565eab28b77'/>
<id>3b53d28e607ba60e8a25b1fca8317565eab28b77</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed SKIPIF when --disable-mbregex is used</title>
<updated>2019-03-30T17:28:33+00:00</updated>
<author>
<name>Matteo Beccati</name>
<email>mbeccati@php.net</email>
</author>
<published>2019-03-29T13:09:39+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=0dbb581cf4d7e99cadda368c9edce5a721dc4036'/>
<id>0dbb581cf4d7e99cadda368c9edce5a721dc4036</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.1' into PHP-7.2</title>
<updated>2019-03-28T07:35:22+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2019-03-28T07:35:22+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=402adc1df13557c805ccafbc97b9e62f829df7e0'/>
<id>402adc1df13557c805ccafbc97b9e62f829df7e0</id>
<content type='text'>
* PHP-7.1:
  Validate subject encoding in mb_split and mb_ereg_match
  Validate pattern against mbregex encoding
  SQLite3: add DEFENSIVE config for SQLite &gt;= 3.26.0 as a mitigation strategy against potential security flaws
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.1:
  Validate subject encoding in mb_split and mb_ereg_match
  Validate pattern against mbregex encoding
  SQLite3: add DEFENSIVE config for SQLite &gt;= 3.26.0 as a mitigation strategy against potential security flaws
</pre>
</div>
</content>
</entry>
<entry>
<title>Validate subject encoding in mb_split and mb_ereg_match</title>
<updated>2019-03-28T06:20:27+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-02-11T11:31:59+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=0ecac37c40a27ffbd59f34b5920735ee0b7f994c'/>
<id>0ecac37c40a27ffbd59f34b5920735ee0b7f994c</id>
<content type='text'>
We were already validating the subject encoding in most functions,
but not these two.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We were already validating the subject encoding in most functions,
but not these two.
</pre>
</div>
</content>
</entry>
<entry>
<title>Validate pattern against mbregex encoding</title>
<updated>2019-03-28T06:19:46+00:00</updated>
<author>
<name>Nikita Popov</name>
<email>nikita.ppv@gmail.com</email>
</author>
<published>2019-02-11T11:10:40+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=40fe50daf6069f73d0be43d8fcd7d5953053c10d'/>
<id>40fe50daf6069f73d0be43d8fcd7d5953053c10d</id>
<content type='text'>
Oniguruma does not consistently perform this validation itself (at least
on older versions), so make sure we check pattern encoding validity on the
PHP side.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Oniguruma does not consistently perform this validation itself (at least
on older versions), so make sure we check pattern encoding validity on the
PHP side.
</pre>
</div>
</content>
</entry>
</feed>
