[pull] master from php:master#741
Merged
pull[bot] merged 48 commits intodolfly:masterfrom May 6, 2026
Merged
Conversation
…[-Werror=unused-but-set-variable=]
…standard library macros: assignment discards 'const' qualifier from pointer target type [-Werror=discarded-qualifiers] See https://sourceware.org/cgit/glibc/commit/?id=cd748a63ab1 Closes GH-21950
* PHP-8.4: Fix compiler warning with glibc 2.43 support of C23 const-preserving standard library macros: assignment discards 'const' qualifier from pointer target type [-Werror=discarded-qualifiers] Fix compiler warning with GCC 16: variable 'offset' set but not used [-Werror=unused-but-set-variable=]
* PHP-8.5: Fix compiler warning with glibc 2.43 support of C23 const-preserving standard library macros: assignment discards 'const' qualifier from pointer target type [-Werror=discarded-qualifiers] Fix compiler warning with GCC 16: variable 'offset' set but not used [-Werror=unused-but-set-variable=]
…th Apache Map Fixes GHSA-85c2-q967-79q5 Fixes CVE-2026-6722
…ailure with SOAP_PERSISTENCE_SESSION Fixes GHSA-m33r-qmcv-p97q Fixes CVE-2026-7261
Fixes GHSA-hmxp-6pc4-f3vv Fixes CVE-2026-7262
Fixes GHSA-7qg2-v9fj-4mwv Fixes CVE-2026-6735
…b_check_encoding() via mb_ereg_search_init() Fixes GHSA-wm6j-2649-pv75 Fixes CVE-2026-7259
* PHP-8.2: GHSA-wm6j-2649-pv75: [mbstring] Fix null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init() GHSA-7qg2-v9fj-4mwv: [fpm] XSS within status endpoint GHSA-hmxp-6pc4-f3vv: [soap] Fix broken Apache map value NULL check GHSA-m33r-qmcv-p97q: [soap] Fix use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION GHSA-85c2-q967-79q5: [soap] Fix stale SOAP_GLOBAL(ref_map) pointer with Apache Map
* PHP-8.3: GHSA-wm6j-2649-pv75: [mbstring] Fix null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init() GHSA-7qg2-v9fj-4mwv: [fpm] XSS within status endpoint GHSA-hmxp-6pc4-f3vv: [soap] Fix broken Apache map value NULL check GHSA-m33r-qmcv-p97q: [soap] Fix use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION GHSA-85c2-q967-79q5: [soap] Fix stale SOAP_GLOBAL(ref_map) pointer with Apache Map
* PHP-8.4: GHSA-wm6j-2649-pv75: [mbstring] Fix null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init() GHSA-7qg2-v9fj-4mwv: [fpm] XSS within status endpoint GHSA-hmxp-6pc4-f3vv: [soap] Fix broken Apache map value NULL check GHSA-m33r-qmcv-p97q: [soap] Fix use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION GHSA-85c2-q967-79q5: [soap] Fix stale SOAP_GLOBAL(ref_map) pointer with Apache Map
* PHP-8.5: GHSA-wm6j-2649-pv75: [mbstring] Fix null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init() GHSA-7qg2-v9fj-4mwv: [fpm] XSS within status endpoint GHSA-hmxp-6pc4-f3vv: [soap] Fix broken Apache map value NULL check GHSA-m33r-qmcv-p97q: [soap] Fix use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION GHSA-85c2-q967-79q5: [soap] Fix stale SOAP_GLOBAL(ref_map) pointer with Apache Map
…n quoted strings Fixes GHSA-w476-322c-wpvm Fixes CVE-2025-14179
* PHP-8.2: GHSA-w476-322c-wpvm: [pdo_firebird] Fix SQL injection via NUL bytes in quoted strings
* PHP-8.3: GHSA-w476-322c-wpvm: [pdo_firebird] Fix SQL injection via NUL bytes in quoted strings
* PHP-8.4: GHSA-w476-322c-wpvm: [pdo_firebird] Fix SQL injection via NUL bytes in quoted strings
* PHP-8.5: GHSA-w476-322c-wpvm: [pdo_firebird] Fix SQL injection via NUL bytes in quoted strings
…array offset Fixes GHSA-96wq-48vp-hh57 Fixes CVE-2026-7568
* PHP-8.2: GHSA-96wq-48vp-hh57: [metaphone] Fix signed integer overflow of char array offset
* PHP-8.3: GHSA-96wq-48vp-hh57: [metaphone] Fix signed integer overflow of char array offset
* PHP-8.4: GHSA-96wq-48vp-hh57: [metaphone] Fix signed integer overflow of char array offset
* PHP-8.5: GHSA-96wq-48vp-hh57: [metaphone] Fix signed integer overflow of char array offset
…ions Fixes GHSA-m8rr-4c36-8gq4 Fixes CVE-2026-7258
…ions Fixes GHSA-m8rr-4c36-8gq4 Fixes CVE-2026-7258
…ions Fixes GHSA-m8rr-4c36-8gq4 Fixes CVE-2026-7258
…ions Fixes GHSA-m8rr-4c36-8gq4 Fixes CVE-2026-7258
* PHP-8.5: GHSA-m8rr-4c36-8gq4: Consistently pass unsigned char to ctype.h functions
…2encoding_ex() Fixes GHSA-74r9-qxhc-fx53 Fixes CVE-2026-6104
* PHP-8.4: GHSA-74r9-qxhc-fx53: [mbstring] Fix out-of-bounds access in mbfl_name2encoding_ex()
* PHP-8.5: GHSA-74r9-qxhc-fx53: [mbstring] Fix out-of-bounds access in mbfl_name2encoding_ex()
* PHP-8.2: [skip ci] Add NEWS entries for 8.2.31 security issues
* PHP-8.3: [skip ci] Add NEWS entries for 8.2.31 security issues
* PHP-8.4: [skip ci] Add NEWS entries for 8.2.31 security issues
* PHP-8.5: [skip ci] Add NEWS entries for 8.2.31 security issues
* PHP-8.2: PHP-8.2 is now for PHP 8.2.32-dev # Conflicts: # Zend/zend.h # configure.ac # main/php_version.h
* PHP-8.3: PHP-8.2 is now for PHP 8.2.32-dev
* PHP-8.4: PHP-8.2 is now for PHP 8.2.32-dev
* PHP-8.5: PHP-8.2 is now for PHP 8.2.32-dev
As requested by the reporter.
* PHP-8.2: [skip ci] Adjust credits for GHSA-96wq-48vp-hh57.phpt
* PHP-8.3: [skip ci] Adjust credits for GHSA-96wq-48vp-hh57.phpt
* PHP-8.4: [skip ci] Adjust credits for GHSA-96wq-48vp-hh57.phpt
* PHP-8.5: [skip ci] Adjust credits for GHSA-96wq-48vp-hh57.phpt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by
pull[bot] (v2.0.0-alpha.4)
Can you help keep this open source service alive? 💖 Please sponsor : )