#
7318b857 |
| 21-Aug-2013 |
Yasuo Ohgaki |
Update NEWS |
#
27c803aa |
| 20-Aug-2013 |
Michael Wallner |
Fix bug #64953 (Postgres prepared statement positional parameter casting) |
#
53d96434 |
| 20-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: bump version Update NEWS Conflicts: configure.in main/php_version.h
|
#
d487f5e9 |
| 20-Aug-2013 |
Stanislav Malyshev |
bump version |
#
4ee1ec4b |
| 20-Aug-2013 |
Christopher Jones |
Update NEWS |
#
c60067c0 |
| 20-Aug-2013 |
Christopher Jones |
Update NEWS |
#
1ac4d8f2 |
| 29-Jul-2013 |
Michael Wallner |
fix bug #65481 (shutdown segfault due to serialize) |
#
69f12ad5 |
| 19-Aug-2013 |
Adam Harvey |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: Track created curl_slist structs by option so they can be updated in situ. Conflicts: ext/curl/interface.c
|
#
aa7d3d8e |
| 19-Aug-2013 |
Adam Harvey |
Track created curl_slist structs by option so they can be updated in situ. At present, when curl_setopt() is called with an option that requires the creation of a curl_slist, we simply p
Track created curl_slist structs by option so they can be updated in situ. At present, when curl_setopt() is called with an option that requires the creation of a curl_slist, we simply push the new curl_slist onto a list to be freed when the curl handle is freed. This avoids a memory leak, but means that repeated calls to curl_setopt() on the same handle with the same option wastes previously allocated memory on curl_slist structs that will no longer be read. This commit changes the zend_llist that was previously used to track the lists to a HashTable keyed by the option number, which means that we can simply update the hash table each time curl_setopt() is called. Fixes bug #65458 (curl memory leak).
show more ...
|
#
bcf785fb |
| 19-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: Fix bug #65470 Segmentation fault in zend_error() with --enable-dtrace
|
#
14f57320 |
| 19-Aug-2013 |
Stanislav Malyshev |
Fix bug #65470 Segmentation fault in zend_error() with --enable-dtrace |
#
bd29ff7c |
| 18-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: Fix for php bug #64802 includes test case Conflicts: ext/openssl/openssl.c
|
#
9973658a |
| 14-Aug-2013 |
Mark Jones |
Fix for php bug #64802 includes test case |
#
b33a1a13 |
| 18-Aug-2013 |
Stanislav Malyshev |
add CVE-2011-4718 |
#
bf0c6f28 |
| 18-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: new for fix #65225 Fixed #65225: PHP_BINARY incorrectly set
|
#
0154db1c |
| 18-Aug-2013 |
Stanislav Malyshev |
new for fix #65225 |
#
803045e3 |
| 16-Aug-2013 |
Christopher Jones |
Fix duplicated 5.5.2 NEWS in my tree |
#
60c8d814 |
| 16-Aug-2013 |
Christopher Jones |
Update NEWS |
#
cb539b3e |
| 16-Aug-2013 |
Christopher Jones |
Update NEWS |
#
57887979 |
| 16-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: fix cve number
|
#
060fadca |
| 16-Aug-2013 |
Stanislav Malyshev |
fix cve number |
#
e8a4477a |
| 15-Aug-2013 |
David Soria Parra |
New news section |
#
f12f3abe |
| 15-Aug-2013 |
David Soria Parra |
Prepare news for PHP-5.5.2 |
#
2b9f5ac2 |
| 14-Aug-2013 |
Stanislav Malyshev |
Merge branch 'PHP-5.4' into PHP-5.5 * PHP-5.4: Fix CVE-2013-4073 - handling of certs with null bytes Fix CVE-2013-4073 - handling of certs with null bytes
|
#
dcea4ec6 |
| 14-Aug-2013 |
Stanislav Malyshev |
Fix CVE-2013-4073 - handling of certs with null bytes |