#7332: php-7.0.2
-------------------------+-------------------------
 Reporter:  fo           |      Owner:  blfs-book@…
     Type:  enhancement  |     Status:  new
 Priority:  high         |  Milestone:  7.9
Component:  BOOK         |    Version:  SVN
 Severity:  normal       |   Keywords:
-------------------------+-------------------------
 == Fixes Include 6 Security Related Issues ==

 [http://www.php.net/distributions/php-7.0.2.tar.xz]

 [http://www.php.net/distributions/php-7.0.2.tar.xz.asc]

 [https://secure.php.net/downloads.php]

 md5: ce5964672e4ec0b66ff088a6bafde8c7

 [https://secure.php.net/archive/2016.php]

 {{{
 PHP 7.0.2 Released
 07 Jan 2016

 The PHP development team announces the immediate availability of PHP
 7.0.2. 31 reported bugs has been fixed, including 6 security related
 issues. All PHP 7.0 users are encouraged to upgrade to this version.

 For source downloads of PHP 7.0.2 please visit our downloads page,
 Windows source and binaries can be found on windows.php.net/download/.
 The list of changes is recorded in the ChangeLog.
 }}}

 [https://secure.php.net/ChangeLog-7.php]

 {{{
 PHP 7 ChangeLog
 Version 7.0.2
 07 Jan 2016

  • Core:
    ◦ Fixed bug #71165 (-DGC_BENCH=1 doesn't work on PHP7).
    ◦ Fixed bug #71163 (Segmentation Fault: cleanup_unfinished_calls).
    ◦ Fixed bug #71109 (ZEND_MOD_CONFLICTS("xdebug") doesn't work).
    ◦ Fixed bug #71092 (Segmentation fault with return type hinting).
    ◦ Fixed bug memleak in header_register_callback.
    ◦ Fixed bug #71067 (Local object in class method stays in memory for
      each call).
    ◦ Fixed bug #66909 (configure fails utf8_to_mutf7 test).
    ◦ Fixed bug #70781 (Extension tests fail on dynamic ext dependency).
    ◦ Fixed bug #71089 (No check to duplicate zend_extension).
    ◦ Fixed bug #71086 (Invalid numeric literal parse error within
      highlight_string() function).
    ◦ Fixed bug #71154 (Incorrect HT iterator invalidation causes
      iterator reuse).
    ◦ Fixed bug #52355 (Negating zero does not produce negative zero).
    ◦ Fixed bug #66179 (var_export() exports float as integer).
    ◦ Fixed bug #70804 (Unary add on negative zero produces positive
      zero).
  • CURL:
    ◦ Fixed bug #71144 (Sementation fault when using cURL with ZTS).
  • DBA:
    ◦ Fixed key leak with invalid resource.
  • Filter:
    ◦ Fixed bug #71063 (filter_input(INPUT_ENV, ..) does not work).
  • FTP:
    ◦ Implemented FR #55651 (Option to ignore the returned FTP PASV
      address).
  • FPM:
    ◦ Fixed bug #70755 (fpm_log.c memory leak and buffer overflow).
  • GD:
    ◦ Fixed bug #70976 (Memory Read via gdImageRotateInterpolated Array
      Index Out of Bounds).
  • Mbstring:
    ◦ Fixed bug #71066 (mb_send_mail: Program terminated with signal
      SIGSEGV, Segmentation fault).
  • Opcache:
    ◦ Fixed bug #71127 (Define in auto_prepend_file is overwrite).
  • PCRE:
    ◦ Fixed bug #71178 (preg_replace with arrays creates [0] in replace
      array if not already set).
  • Readline:
    ◦ Fixed bug #71094 (readline_completion_function corrupts static
      array on second TAB).
  • Session:
    ◦ Fixed bug #71122 (Session GC may not remove obsolete session data).
  • SPL:
    ◦ Fixed bug #71077 (ReflectionMethod for ArrayObject constructor
      returns wrong number of parameters).
    ◦ Fixed bug #71153 (Performance Degradation in ArrayIterator with
      large arrays).
  • Standard:
    ◦ Fixed bug #71270 (Heap BufferOver Flow in escapeshell functions).
  • WDDX:
    ◦ Fixed bug #70661 (Use After Free Vulnerability in WDDX Packet
      Deserialization).
    ◦ Fixed bug #70741 (Session WDDX Packet Deserialization Type
      Confusion Vulnerability).
  • XMLRPC:
    ◦ Fixed bug #70728 (Type Confusion Vulnerability in
      PHP_to_XMLRPC_worker).
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/7332>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to