-
Notifications
You must be signed in to change notification settings - Fork 8k
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: php/php-src
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: php-8.2.2
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: php/php-src
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: php-8.2.3
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 8 commits
- 17 files changed
- 4 contributors
Commits on Feb 5, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 1793f8d - Browse repository at this point
Copy the full SHA 1793f8dView commit details
Commits on Feb 10, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 89a20c2 - Browse repository at this point
Copy the full SHA 89a20c2View commit details -
Introduce max_multipart_body_parts INI
This fixes GHSA-54hq-v5wp-fqgv DOS vulnerabality by limitting number of parsed multipart body parts as currently all parts were always parsed.
Configuration menu - View commit details
-
Copy full SHA for 95b33b6 - Browse repository at this point
Copy the full SHA 95b33b6View commit details
Commits on Feb 13, 2023
-
crypt: Fix validation of malformed BCrypt hashes
PHP’s implementation of crypt_blowfish differs from the upstream Openwall version by adding a “PHP Hack”, which allows one to cut short the BCrypt salt by including a `$` character within the characters that represent the salt. Hashes that are affected by the “PHP Hack” may erroneously validate any password as valid when used with `password_verify` and when comparing the return value of `crypt()` against the input. The PHP Hack exists since the first version of PHP’s own crypt_blowfish implementation that was added in 1e820ec. No clear reason is given for the PHP Hack’s existence. This commit removes it, because BCrypt hashes containing a `$` character in their salt are not valid BCrypt hashes.
Configuration menu - View commit details
-
Copy full SHA for e2e6c57 - Browse repository at this point
Copy the full SHA e2e6c57View commit details -
Configuration menu - View commit details
-
Copy full SHA for 86d0d1b - Browse repository at this point
Copy the full SHA 86d0d1bView commit details -
Fix array overrun when appending slash to paths
Fix it by extending the array sizes by one character. As the input is limited to the maximum path length, there will always be place to append the slash. As the php_check_specific_open_basedir() simply uses the strings to compare against each other, no new failures related to too long paths are introduced. We'll let the DOM and XML case handle a potentially too long path in the library code.
Configuration menu - View commit details
-
Copy full SHA for 0f2957f - Browse repository at this point
Copy the full SHA 0f2957fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 38bd305 - Browse repository at this point
Copy the full SHA 38bd305View commit details
Commits on Feb 14, 2023
-
Configuration menu - View commit details
-
Copy full SHA for cde956a - Browse repository at this point
Copy the full SHA cde956aView commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff php-8.2.2...php-8.2.3