Commit: d20111d723478fdc30e3d19092e93010b8b4ecab
Author: Stanislav Malyshev <smalys...@gmail.com> Thu, 26 Jun 2014
15:34:10 -0700
Parents: 1e303bbe09ab5fd5160d6a5f7359dc656e82540c
Branches: master
Link:
http://git.php.net/?p=web/php.git;a=commitdiff;h=d20111d723478fdc30e3d19092e93010b8b4ecab
Log:
5.4.30
Changed paths:
M ChangeLog-5.php
M archive/archive.xml
A archive/entries/2014-06-26-1.xml
M include/releases.inc
M include/version.inc
A releases/5_4_30.php
diff --git a/ChangeLog-5.php b/ChangeLog-5.php
index e7e48eb..b92c4ea 100644
--- a/ChangeLog-5.php
+++ b/ChangeLog-5.php
@@ -8,6 +8,62 @@ site_header("PHP 5 ChangeLog", array("current" => "docs",
"css" => array("change
<h1>PHP 5 ChangeLog</h1>
+<section class="version" id="5.4.30"><!-- {{{ 5.4.30 -->
+<h3>Version 5.4.30</h3>
+<b>26-Jun-2014</b>
+<ul><li>Core:
+<ul>
+ <li>Fixed BC break introduced by patch for bug <?php bugl(67072); ?>.</li>
+ <li><?php bugfix(66622); ?> (Closures do not correctly capture the late
bound class (static::) in some cases).</li>
+ <li><?php bugfix(67390); ?> (insecure temporary file use in the configure
script) (CVE-2014-3981).</li>
+ <li><?php bugfix(67399); ?> (putenv with empty variable may lead to
crash).</li>
+ <li><?php bugfix(67498); ?> (phpinfo() Type Confusion Information Leak
Vulnerability).</li>
+</ul></li>
+<li>CLI server:
+<ul>
+ <li><?php bugfix(67406); ?> (built-in web-server segfaults on startup).</li>
+</ul></li>
+<li>Date:
+<ul>
+ <li><?php bugfix(67308); ?> (Serialize of DateTime truncates fractions of
second).</li>
+ <li>Fixed regression in fix for bug <?php bugl(67118); ?> (constructor can't
be called twice).</li>
+</ul></li>
+<li>Fileinfo:
+<ul>
+ <li><?php bugfix(67326); ?> (fileinfo: cdf_read_short_sector insufficient
boundary check) (CVE-2014-0207).</li>
+ <li><?php bugfix(67410); ?> (fileinfo: mconvert incorrect handling of
truncated pascal string size) (CVE-2014-3478).</li>
+ <li><?php bugfix(67411); ?> (fileinfo: cdf_check_stream_offset insufficient
boundary check) (CVE-2014-3479).</li>
+ <li><?php bugfix(67412); ?> (fileinfo: cdf_count_chain insufficient boundary
check) (CVE-2014-3480).</li>
+ <li><?php bugfix(67413); ?> (fileinfo: cdf_read_property_info insufficient
boundary check) (CVE-2014-3487).</li>
+</ul></li>
+<li>Intl:
+<ul>
+ <li><?php bugfix(67349); ?> (Locale::parseLocale Double Free).</li>
+ <li><?php bugfix(67397); ?> (Buffer overflow in locale_get_display_name and
uloc_getDisplayName (libicu 4.8.1)).</li>
+</ul></li>
+<li>Network:
+<ul>
+ <li><?php bugfix(67432); ?> (Fix potential segfault in dns_get_record())
(CVE-2014-4049).</li>
+</ul></li>
+<li>OpenSSL:
+<ul>
+ <li><?php bugfix(65698); ?> (certificates validity parsing does not work
past 2050).</li>
+ <li><?php bugfix(66636); ?> (openssl_x509_parse warning with
V_ASN1_GENERALIZEDTIME).</li>
+</ul></li>
+<li>SOAP:
+<ul>
+ <li>Implemented FR <?php bugl(49898); ?> (Add
SoapClient::__getCookies()).</li>
+</ul></li>
+<li>SPL:
+<ul>
+ <li><?php bugfix(66127); ?> (Segmentation fault with ArrayObject unset).</li>
+ <li><?php bugfix(67359); ?> (Segfault in recursiveDirectoryIterator).</li>
+ <li><?php bugfix(67360); ?> (Missing element after
ArrayObject::getIterator).</li>
+ <li><?php bugfix(67492); ?> (unserialize() SPL ArrayObject /
SPLObjectStorage Type Confusion) (CVE-2014-3515).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
<section class="version" id="5.5.13"><!-- {{{ 5.5.13 -->
<h3>Version 5.5.13</h3>
<?php release_date('29-May-2014'); ?>
diff --git a/archive/archive.xml b/archive/archive.xml
index 5c41f81..15cc0a9 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>php-webmaster@lists.php.net</email>
</author>
+ <xi:include href="entries/2014-06-26-1.xml"/>
<xi:include href="entries/2014-06-19-3.xml"/>
<xi:include href="entries/2014-06-19-2.xml"/>
<xi:include href="entries/2014-06-19-1.xml"/>
diff --git a/archive/entries/2014-06-26-1.xml b/archive/entries/2014-06-26-1.xml
new file mode 100644
index 0000000..f051a4c
--- /dev/null
+++ b/archive/entries/2014-06-26-1.xml
@@ -0,0 +1,37 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>PHP 5.4.30 Released</title>
+ <id>http://php.net/archive/2014.php#id2014-06-26-1</id>
+ <published>2014-06-26T15:31:05-07:00</published>
+ <updated>2014-06-26T15:31:05-07:00</updated>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <category term="releases" label="New PHP release"/>
+ <link href="http://php.net/index.php#id2014-06-26-1" rel="alternate"
type="text/html"/>
+ <link href="http://php.net/archive/2014.php#id2014-06-26-1" rel="via"
type="text/html"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP development team announces the immediate availability of PHP
+ 5.4.30. Over 20 bugs were fixed in this release, including the following
security issues:
+ CVE-2014-3981, CVE-2014-0207, CVE-2014-3478, CVE-2014-3479,
CVE-2014-3480, CVE-2014-3487,
+ CVE-2014-4049, CVE-2014-3515.
+
+ All PHP 5.4 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>Please, note that this release also fixes a backward compatibility
issue that has been
+ detected in the PHP 5.4.29 release. Still, the fix in PHP 5.4.30 may
break some very rare
+ situations. As this tiny compatibility break involves security, and as
security is our primary
+ concern, we had to fix it. This concerns
+ <a href="https://bugs.php.net/bug.php?id=67072">bug 67072</a>. For more
information about
+ this bug and its actual resolution, please refer to our
+ <a
href="http://git.php.net/?p=php-src.git;a=blob_plain;f=UPGRADING;hb=refs/heads/PHP-5.4">upgrading
guide</a>, section 4a.
+ We apologize for any inconvenience you may have experienced with this
behavior.</p>
+
+
+ <p>For source downloads of PHP 5.4.30 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-5.php#5.4.30">ChangeLog</a>.
+ </p>
+ </div>
+ </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index 2f0e771..8b0a90f 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -438,6 +438,37 @@ $OLDRELEASES = array (
'date' => '20 Jun 2013',
'museum' => true,
),
+ '5.4.29' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/5_4_29.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-5.4.29.tar.bz2',
+ 'name' => 'PHP 5.4.29 (tar.bz2)',
+ 'md5' => '64326cef257e5af17c366fefab136e53',
+ 'date' => '29 May 2014',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-5.4.29.tar.gz',
+ 'name' => 'PHP 5.4.29 (tar.gz)',
+ 'md5' => '9caf973b19ba93bb2b78f78c61643d5d',
+ 'date' => '29 May 2014',
+ ),
+ 2 =>
+ array (
+ 'link' => 'http://windows.php.net/download/#php-5.4',
+ 'name' => 'Windows 5.4.29 binaries and source',
+ ),
+ ),
+ 'date' => '29 May 2014',
+ 'museum' => false,
+ ),
'5.4.28' =>
array (
'announcement' =>
@@ -455,8 +486,8 @@ $OLDRELEASES = array (
),
1 =>
array (
- 'filename' => 'php-5.4.27.tar.gz',
- 'name' => 'PHP 5.4.27 (tar.gz)',
+ 'filename' => 'php-5.4.28.tar.gz',
+ 'name' => 'PHP 5.4.28 (tar.gz)',
'md5' => '7fd1235a56d4579ef3c9497a983c4a83',
'date' => '2 May 2014',
),
diff --git a/include/version.inc b/include/version.inc
index 4dd1e3f..a76e663 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -26,14 +26,14 @@ $PHP_5_5_MD5 = array(
"tar.xz" => "57d5d9607511a5cb76e9af49dd5874e3",
);
/* PHP 5.4 Release */
-$PHP_5_4_RC = '5.4.30RC1'; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_5_4_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
$PHP_5_4_RC_DATE = '12 Jun 2014';
-$PHP_5_4_VERSION = "5.4.29";
-$PHP_5_4_DATE = "29 May 2014";
+$PHP_5_4_VERSION = "5.4.30";
+$PHP_5_4_DATE = "26 Jun 2014";
$PHP_5_4_MD5 = array(
- "tar.bz2" => "64326cef257e5af17c366fefab136e53",
- "tar.gz" => "9caf973b19ba93bb2b78f78c61643d5d",
+ "tar.bz2" => "a8a27fdc1d9e1020c9f8922b608326de",
+ "tar.gz" => "461afd4b84778c5845b71e837776139f",
);
/* PHP 5.3 Release */
diff --git a/releases/5_4_30.php b/releases/5_4_30.php
new file mode 100644
index 0000000..d43af9e
--- /dev/null
+++ b/releases/5_4_30.php
@@ -0,0 +1,33 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/5_4_30.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 5.4.30 Release Announcement");
+?>
+
+<h1>PHP 5.4.30 Release Announcement</h1>
+
+<p>The PHP development team announces the immediate availability of PHP
+5.4.30. Over 20 bugs were fixed in this release, including the following
security issues:
+CVE-2014-3981, CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480,
CVE-2014-3487,
+CVE-2014-4049, CVE-2014-3515.
+
+All PHP 5.4 users are encouraged to upgrade to this version.
+</p>
+
+<p>Please, note that this release also fixes a backward compatibility issue
that has been
+detected in the PHP 5.4.29 release. Still, the fix in PHP 5.4.30 may break
some very rare
+situations. As this tiny compatibility break involves security, and as
security is our primary
+concern, we had to fix it. This concerns
+<a href="https://bugs.php.net/bug.php?id=67072">bug 67072</a>. For more
information about
+this bug and its actual resolution, please refer to our
+<a
href="http://git.php.net/?p=php-src.git;a=blob_plain;f=UPGRADING;hb=refs/heads/PHP-5.4">upgrading
guide</a>, section 4a.
+We apologize for any inconvenience you may have experienced with this
behavior.</p>
+
+
+<p>For source downloads of PHP 5.4.30 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+Windows binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-5.php#5.4.30">ChangeLog</a>.
+</p>
+
+<?php site_footer(); ?>
--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php