<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/php-git.git/sapi/cli, branch php-5.6.16</title>
<subtitle>git.php.net: repository/php-src.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/'/>
<entry>
<title>Add test XFAIL for bug #70470</title>
<updated>2015-09-11T05:45:18+00:00</updated>
<author>
<name>Xinchen Hui</name>
<email>laruence@gmail.com</email>
</author>
<published>2015-09-11T05:45:18+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=37d814b84cff3678a2e1d56ea9d3ba3c35082e13'/>
<id>37d814b84cff3678a2e1d56ea9d3ba3c35082e13</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #68291: 404 on urls with '+'</title>
<updated>2015-09-05T12:34:08+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmbecker69@gmx.de</email>
</author>
<published>2015-09-05T11:52:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=fd94c92171eb4f25a792b38c7754bdd76933ec04'/>
<id>fd94c92171eb4f25a792b38c7754bdd76933ec04</id>
<content type='text'>
URI paths have to be treated according to RFC 3986 by the CLI web server, not
as application/x-www-form-urlencoded.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
URI paths have to be treated according to RFC 3986 by the CLI web server, not
as application/x-www-form-urlencoded.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #70264: CLI server directory traversal</title>
<updated>2015-08-14T15:05:31+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmb@php.net</email>
</author>
<published>2015-08-14T14:56:40+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=9c805a6cb31596c41609512bdd8a9a76c9ce9b15'/>
<id>9c805a6cb31596c41609512bdd8a9a76c9ce9b15</id>
<content type='text'>
On Windows the built-in webserver doesn't prevent directory traversal when
backslashes are used as path component separators. Even though that is not a
security issue (the CLI webserver is meant for testing only), we fix that by
replacing backslashes in the path with slashes on Windows, because backslashes
may be valid characters for file names on other systems, but not on Windows.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
On Windows the built-in webserver doesn't prevent directory traversal when
backslashes are used as path component separators. Even though that is not a
security issue (the CLI webserver is meant for testing only), we fix that by
replacing backslashes in the path with slashes on Windows, because backslashes
may be valid characters for file names on other systems, but not on Windows.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix #66606: Sets HTTP_CONTENT_TYPE but not CONTENT_TYPE</title>
<updated>2015-08-09T00:37:16+00:00</updated>
<author>
<name>wusuopu</name>
<email>admin@longchangjin.cn</email>
</author>
<published>2014-11-03T06:52:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=72976e2497f963b7f203443f9881d52e0ff97962'/>
<id>72976e2497f963b7f203443f9881d52e0ff97962</id>
<content type='text'>
The patch will store Content-Type header value in both HTTP_CONTENT_TYPE field and CONTENT_TYPE field.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The patch will store Content-Type header value in both HTTP_CONTENT_TYPE field and CONTENT_TYPE field.
</pre>
</div>
</content>
</entry>
<entry>
<title>added tests for bug #66606</title>
<updated>2015-08-09T00:36:58+00:00</updated>
<author>
<name>Christoph M. Becker</name>
<email>cmb@php.net</email>
</author>
<published>2015-08-09T00:36:58+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=1b4a80332c78045ac4a24208951f96fbd700825f'/>
<id>1b4a80332c78045ac4a24208951f96fbd700825f</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-5.5' into PHP-5.6</title>
<updated>2015-08-04T23:45:55+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2015-08-04T23:45:55+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=54187fa4b953d9d908a844d802cfe20472776ff5'/>
<id>54187fa4b953d9d908a844d802cfe20472776ff5</id>
<content type='text'>
* PHP-5.5:
  fix test
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-5.5:
  fix test
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-5.4' into PHP-5.5</title>
<updated>2015-08-04T23:45:32+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2015-08-04T23:45:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=2425f88afd487181e4b2a86e9008b98a03dfb663'/>
<id>2425f88afd487181e4b2a86e9008b98a03dfb663</id>
<content type='text'>
* PHP-5.4:
  fix test
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-5.4:
  fix test
</pre>
</div>
</content>
</entry>
<entry>
<title>fix test</title>
<updated>2015-08-04T23:45:20+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2015-08-04T23:45:20+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=da5321013c4dbac0faac12f78b28f662a91b4bc1'/>
<id>da5321013c4dbac0faac12f78b28f662a91b4bc1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-5.5' into PHP-5.6</title>
<updated>2015-08-04T22:29:13+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2015-08-04T22:29:13+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=ed709d5aa01375beb7e0b408c4027bbb9cfb52b6'/>
<id>ed709d5aa01375beb7e0b408c4027bbb9cfb52b6</id>
<content type='text'>
* PHP-5.5:
  update NEWS
  fix test
  update NEWS
  Fix bug #70019 - limit extracted files to given directory
  Do not do convert_to_* on unserialize, it messes up references
  Fix #69793 - limit what we accept when unserializing exception
  Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList)
  Fixed bug #70166 - Use After Free Vulnerability in unserialize() with SPLArrayObject
  ignore signatures for packages too
  Fix bug #70168 - Use After Free Vulnerability in unserialize() with SplObjectStorage
  Fixed bug #69892
  Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes
  Improved fix for Bug #69441
  Fix bug #70068 (Dangling pointer in the unserialization of ArrayObject items)
  Fix bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)
  Fix bug #70081: check types for SOAP variables

Conflicts:
	ext/soap/php_http.c
	ext/spl/spl_observer.c
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-5.5:
  update NEWS
  fix test
  update NEWS
  Fix bug #70019 - limit extracted files to given directory
  Do not do convert_to_* on unserialize, it messes up references
  Fix #69793 - limit what we accept when unserializing exception
  Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList)
  Fixed bug #70166 - Use After Free Vulnerability in unserialize() with SPLArrayObject
  ignore signatures for packages too
  Fix bug #70168 - Use After Free Vulnerability in unserialize() with SplObjectStorage
  Fixed bug #69892
  Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes
  Improved fix for Bug #69441
  Fix bug #70068 (Dangling pointer in the unserialization of ArrayObject items)
  Fix bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)
  Fix bug #70081: check types for SOAP variables

Conflicts:
	ext/soap/php_http.c
	ext/spl/spl_observer.c
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'PHP-5.4' into PHP-5.5</title>
<updated>2015-08-04T21:46:30+00:00</updated>
<author>
<name>Stanislav Malyshev</name>
<email>stas@php.net</email>
</author>
<published>2015-08-04T21:46:30+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/php-git.git/commit/?id=742c54aecfc4cbc3c0cfccbe4eee1d50946f44d8'/>
<id>742c54aecfc4cbc3c0cfccbe4eee1d50946f44d8</id>
<content type='text'>
* PHP-5.4:
  fix test
  update NEWS
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* PHP-5.4:
  fix test
  update NEWS
</pre>
</div>
</content>
</entry>
</feed>
