<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git/ext/standard/tests/url, branch master</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/'/>
<entry>
<title>Merge branch 'PHP-8.0'</title>
<updated>2021-01-27T07:01:40+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2021-01-27T07:01:40+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=7eff4057dedeffee81b23f23d48c06a2082f9a06'/>
<id>7eff4057dedeffee81b23f23d48c06a2082f9a06</id>
<content type='text'>
* PHP-8.0:
  Alternative fix for bug 77423
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-8.0:
  Alternative fix for bug 77423
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.4' into PHP-8.0</title>
<updated>2021-01-27T06:55:16+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2021-01-27T06:55:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=effa287b35775de9a600dddfd01cad081fa5f28f'/>
<id>effa287b35775de9a600dddfd01cad081fa5f28f</id>
<content type='text'>
* PHP-7.4:
  Alternative fix for bug 77423
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.4:
  Alternative fix for bug 77423
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.3' into PHP-7.4</title>
<updated>2021-01-27T06:55:10+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2021-01-27T06:55:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=fbf8c758fe31a19f35af839b97dc261a936c9b6e'/>
<id>fbf8c758fe31a19f35af839b97dc261a936c9b6e</id>
<content type='text'>
* PHP-7.3:
  Alternative fix for bug 77423
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.3:
  Alternative fix for bug 77423
</pre>
</div>
</content>
</entry>
<entry>
<title>Alternative fix for bug 77423</title>
<updated>2021-01-27T06:54:58+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2021-01-19T10:23:25+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=4a89e726bd4d0571991dc22a9a1ad4509e8fe347'/>
<id>4a89e726bd4d0571991dc22a9a1ad4509e8fe347</id>
<content type='text'>
That bug report originally was about `parse_url()` misbehaving, but the
security aspect was actually only regarding `FILTER_VALIDATE_URL`.
Since the changes to `parse_url_ex()` apparently affect userland code
which is relying on the sloppy URL parsing[1], this alternative
restores the old parsing behavior, but ensures that the userinfo is
checked for correctness for `FILTER_VALIDATE_URL`.

[1] &lt;https://github.com/php/php-src/commit/5174de7cd33c3d4fa591c9c93859ff9989b07e8c#commitcomment-45967652&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
That bug report originally was about `parse_url()` misbehaving, but the
security aspect was actually only regarding `FILTER_VALIDATE_URL`.
Since the changes to `parse_url_ex()` apparently affect userland code
which is relying on the sloppy URL parsing[1], this alternative
restores the old parsing behavior, but ensures that the userinfo is
checked for correctness for `FILTER_VALIDATE_URL`.

[1] &lt;https://github.com/php/php-src/commit/5174de7cd33c3d4fa591c9c93859ff9989b07e8c#commitcomment-45967652&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Skip bug77423 if filter extension is unavailable.</title>
<updated>2021-01-17T15:44:45+00:00</updated>
<author>
<name>Tyson Andre</name>
<email>tysonandre775@hotmail.com</email>
</author>
<published>2021-01-17T15:44:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=81d20d003c3bf172069937c987fe3390c1daafe4'/>
<id>81d20d003c3bf172069937c987fe3390c1daafe4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #77423: parse_url() will deliver a wrong host to user</title>
<updated>2021-01-04T09:20:21+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-05-13T07:36:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=5174de7cd33c3d4fa591c9c93859ff9989b07e8c'/>
<id>5174de7cd33c3d4fa591c9c93859ff9989b07e8c</id>
<content type='text'>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #77423: parse_url() will deliver a wrong host to user</title>
<updated>2021-01-04T09:19:18+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-05-13T07:36:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=b132da7f9df39c1774997f21016c522b676a6ab0'/>
<id>b132da7f9df39c1774997f21016c522b676a6ab0</id>
<content type='text'>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.3' into PHP-7.4</title>
<updated>2021-01-02T05:29:08+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2021-01-02T05:07:15+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=434c2b1bdbed80f01f5bc6c817c9b87fef917919'/>
<id>434c2b1bdbed80f01f5bc6c817c9b87fef917919</id>
<content type='text'>
* PHP-7.3:
  Fix #77423: parse_url() will deliver a wrong host to user
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.3:
  Fix #77423: parse_url() will deliver a wrong host to user
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-7.2' into PHP-7.3</title>
<updated>2021-01-02T05:06:07+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2021-01-02T05:06:07+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=128fca40376140c60b47a1c3750bb6435866838e'/>
<id>128fca40376140c60b47a1c3750bb6435866838e</id>
<content type='text'>
* PHP-7.2:
  Fix #77423: parse_url() will deliver a wrong host to user
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-7.2:
  Fix #77423: parse_url() will deliver a wrong host to user
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #77423: parse_url() will deliver a wrong host to user</title>
<updated>2021-01-02T04:08:01+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2020-05-13T07:36:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=2d3d72412a6734e19a38ed10f385227a6238e4a6'/>
<id>2d3d72412a6734e19a38ed10f385227a6238e4a6</id>
<content type='text'>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To avoid that `parse_url()` returns an erroneous host, which would be
valid for `FILTER_VALIDATE_URL`, we make sure that only userinfo which
is valid according to RFC 3986 is treated as such.

For consistency with the existing url parsing code, we use ctype
functions, although that is not necessarily correct.
</pre>
</div>
</content>
</entry>
</feed>
