#
f20a2b4f |
| 29-Sep-2020 |
Stanislav Malyshev |
[ci skip] Add 7.4.11 security fixes to NEWS
|
#
bf5f07cc |
| 26-Sep-2020 |
Christoph M. Becker |
Fix #80152: odbc_execute() moves internal pointer of $params As least intrusive fix, we separate the passed array argument. Closes GH-6219.
|
#
df5efa2f |
| 25-Sep-2020 |
Christoph M. Becker |
Fix #80150: Failure to fetch error message In case of statement related errors, we need to pass the respective statement handle to `SQLError()`. Closes GH-6217.
|
#
7bc112a1 |
| 29-Sep-2020 |
Stanislav Malyshev |
Update NEWS & UPGRADING
|
#
6acfb792 |
| 28-Sep-2020 |
Christoph M. Becker |
Fix #67465: NULL Pointer dereference in odbc_handle_preparer We have to initialize `stmt->driver_data` before we use it. Closes GH-6225.
|
#
a49555a9 |
| 25-Sep-2020 |
Christoph M. Becker |
Fix #80147: BINARY strings may not be properly zero-terminated We have to manually ensure that all strings fetched from a data source are zero-terminated. Closes GH-6213.
|
#
610e7d2c |
| 24-Sep-2020 |
Christoph M. Becker |
Fix #78470: odbc_specialcolumns() no longer accepts $nullable It is mandatory to pass either `SQL_NO_NULLS` or `SQL_NULLABLE` as tenth parameter to `SQLSpecialColumns()`; otherwise the f
Fix #78470: odbc_specialcolumns() no longer accepts $nullable It is mandatory to pass either `SQL_NO_NULLS` or `SQL_NULLABLE` as tenth parameter to `SQLSpecialColumns()`; otherwise the function call fails. Therefore the user must be allowed to pass the desired value as parameter to `odbc_specialcolumns()` again. Closes GH-6200.
show more ...
|
#
2576c57a |
| 22-Sep-2020 |
Christoph M. Becker |
Fix #76735: Incorrect message in fopen on invalid mode We have to log errors in `stream_opener` callbacks to the wrapper's error log, because otherwise we may pick up an unrelated `errno
Fix #76735: Incorrect message in fopen on invalid mode We have to log errors in `stream_opener` callbacks to the wrapper's error log, because otherwise we may pick up an unrelated `errno` or a most generic message. Closes GH-6187.
show more ...
|
#
5ed0602e |
| 22-Sep-2020 |
Christoph M. Becker |
Fix #76943: Inconsistent stream_wrapper_restore() errors If restoring of any not registered built-in wrapper is requested, the function is supposed to fail with a warning, so we have to
Fix #76943: Inconsistent stream_wrapper_restore() errors If restoring of any not registered built-in wrapper is requested, the function is supposed to fail with a warning, so we have to check this condition first. Furthermore, to be able to detect whether a built-in wrapper has been changed, it is not sufficient to check whether *any* userland wrapper has been registered, but rather whether the specific wrapper has been modified. Closes GH-6183.
show more ...
|
#
4000780b |
| 09-Sep-2020 |
Christoph M. Becker |
Fix #79423: copy command is limited to size of file it can copy Passing `NULL` as `lpFileSizeHigh` to `GetFileSize()` gives wrong results for files larger than 0xFFFFFFFF bytes. We fix
Fix #79423: copy command is limited to size of file it can copy Passing `NULL` as `lpFileSizeHigh` to `GetFileSize()` gives wrong results for files larger than 0xFFFFFFFF bytes. We fix this by using `GetFileSizeEx()`, and let the mapping fail, if the file size is too large for the architecture. Closes GH-5319.
show more ...
|
#
19c84459 |
| 21-Sep-2020 |
Christoph M. Becker |
Fix mmap copying Instead of attempting to map large files into memory at once, we map chunks of at most `PHP_STREAM_MMAP_MAX` bytes, and repeat that until we hit the point where `php
Fix mmap copying Instead of attempting to map large files into memory at once, we map chunks of at most `PHP_STREAM_MMAP_MAX` bytes, and repeat that until we hit the point where `php_stream_seek()` fails (see bug 54902), and copy the rest of the file by reading and writing small chunks. We also fix the mapping behavior for zero bytes on Windows, which did not error (as with `mmap()`), but would have mapped the remaining file.
show more ...
|
#
d27dc5c0 |
| 19-Sep-2020 |
Christoph M. Becker |
Fix #80118: Erroneous whitespace match with JIT only We backport r1273[1] from PCRE2. [1] <https://vcs.pcre.org/pcre2?revision=1273&view=revision> Closes GH-6165.
|
#
81b2f3e5 |
| 20-Sep-2020 |
Christoph M. Becker |
Fix #80114: parse_url does not accept URLs with port 0 URIs with a 0 port are generally valid, so `parse_url()` should recognize such URIs, but still report the port as missing.
Fix #80114: parse_url does not accept URLs with port 0 URIs with a 0 port are generally valid, so `parse_url()` should recognize such URIs, but still report the port as missing. Co-authored-by: twosee <twose@qq.com> Closes GH-6152.
show more ...
|
#
ecd9c42f |
| 16-Sep-2020 |
Nikita Popov |
Fix bug #80107: Handling of large compressed packets There's two layers of packet splitting going on. First, packets need to be split into having a payload of exactly 2^24-1 bytes or
Fix bug #80107: Handling of large compressed packets There's two layers of packet splitting going on. First, packets need to be split into having a payload of exactly 2^24-1 bytes or being the last packet. If the split packet has size between 2^24-5 and 2^24-1 bytes, the compressed packets also needs to be split, though the choice of split doesn't matter here. I'm splitting off the first 8192 bytes, as that's what I observe libmysqlclient to be doing.
show more ...
|
#
9f2d0395 |
| 17-Sep-2020 |
Christoph M. Becker |
Update to PCRE2 10.35 We also backport the fix for bug #79846, and add a test case for the related bug #79363.
|
#
efdbc368 |
| 17-Sep-2020 |
Christoph M. Becker |
Fix #80115: mysqlnd.debug doesn't recognize absolute paths with slashes
|
#
a4f806aa |
| 17-Sep-2020 |
Nikita Popov |
Fixed bug #80083 Add db2_execute() to the list of functions accessing the local scope. Ideally the API wouldn't do that, but it seems most pragmatic to address this on the opcache si
Fixed bug #80083 Add db2_execute() to the list of functions accessing the local scope. Ideally the API wouldn't do that, but it seems most pragmatic to address this on the opcache side at this point.
show more ...
|
#
4e794b79 |
| 15-Sep-2020 |
Derick Rethans |
The next release here will be 7.4.12
|
#
dfb3a799 |
| 09-Sep-2020 |
Christoph M. Becker |
Fix #80067: Omitting the port in bindto setting errors A recent commit[1] which fixed a memory leak introduced a regression regarding the formerly liberal handling of IP addresses to bin
Fix #80067: Omitting the port in bindto setting errors A recent commit[1] which fixed a memory leak introduced a regression regarding the formerly liberal handling of IP addresses to bind to. We fix this by reverting that commit, and fix the memory leak where it actually occurs. In other words, this fix is less intrusive than the former fix. [1] <http://git.php.net/?p=php-src.git;a=commit;h=0b8c83f5936581942715d14883cdebddc18bad30> Closes GH-6104.
show more ...
|
#
2d4aa1ef |
| 10-Jul-2020 |
Sammy Kaye Powers |
Fix #79825: opcache.file_cache causes SIGSEGV with custom opcode handlers Modules may have changed after restart which can cause dangling pointers from custom opcode handlers in the second-l
Fix #79825: opcache.file_cache causes SIGSEGV with custom opcode handlers Modules may have changed after restart which can cause dangling pointers from custom opcode handlers in the second-level cache files. This fix includes the installed module names and versions in the accel_system_id hash as entropy. Closes GH-5836
show more ...
|
#
5dcb8f2f |
| 08-Sep-2020 |
Christoph M. Becker |
Fix #72941: Modifying bucket->data by-ref has no effect any longer To match the PHP 5 behavior, we have to explicitly cater to `buffer` or `data` being references. Closes GH-609
Fix #72941: Modifying bucket->data by-ref has no effect any longer To match the PHP 5 behavior, we have to explicitly cater to `buffer` or `data` being references. Closes GH-6096.
show more ...
|
#
07cb6655 |
| 08-Sep-2020 |
Nikita Popov |
Fixed bug #80077 Quoting from the bug report: > The domain names passed to getmxrr() do not contain a trailing dot. > DNS lookups which do not find records will (depending on th
Fixed bug #80077 Quoting from the bug report: > The domain names passed to getmxrr() do not contain a trailing dot. > DNS lookups which do not find records will (depending on the local > resolver config) try again by adding the local domain to the end of > the searched host/domain. In many environments there's an mx record > for any subdomain of the local domain and the MX query will return > a hit. But the test expects no hit. So the test fails when checking > that "qa.php.net" does not have an MX record in DNS. In our local > environment the resolver falls back to also check qa.php.net.kippdata.de > which does have an MX record. Using "qa.php.net." instead of "qa.php.net" > should fix this for everyone.
show more ...
|
#
46a49be6 |
| 03-Sep-2020 |
Nikita Popov |
Fixed bug #80049 Type checking may convert to refcounted values, so force freeing of extra args.
|
#
1848ccda |
| 03-Sep-2020 |
Christoph M. Becker |
Fix #80048: Bug #69100 has not been fixed for Windows We fix the erroneous length calculation on Windows, too. Closes GH-6067.
|
#
8516434a |
| 03-Sep-2020 |
Nikita Popov |
Fixed bug #80046 We already protect against optimizing away loop frees in DFA pass, but not in block pass.
|