Commit: fa0cd6bb537c0a378166360eda4ae73c169eaf2e Author: Johannes Schlüter <[email protected]> Thu, 14 Aug 2014 14:24:24 +0200 Parents: 75cc7f68fbcab5d6e2ad1dbfc58549f280402880 Branches: master
Link: http://git.php.net/?p=web/php.git;a=commitdiff;h=fa0cd6bb537c0a378166360eda4ae73c169eaf2e Log: PHP 5.3.29 (except frontpage announcement) Changed paths: M ChangeLog-5.php M include/releases.inc M include/version.inc Diff: diff --git a/ChangeLog-5.php b/ChangeLog-5.php index 1e9eb7c..04c299b 100644 --- a/ChangeLog-5.php +++ b/ChangeLog-5.php @@ -8,6 +8,68 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change <h1>PHP 5 ChangeLog</h1> +<section class="version" id="5.3.29"><!-- {{{ 5.3.29 --> +<h3>Version 5.3.29</h3> +<?php release_date('14-Aug-2014'); ?> +<ul><li>Core: +<ul> + <li><?php bugfix(66127); ?> (Segmentation fault with ArrayObject unset).</li> + <li><?php bugfix(67247); ?> (spl_fixedarray_resize integer overflow).</li> + <li><?php bugfix(67249); ?> (printf out-of-bounds read).</li> + <li><?php bugfix(67250); ?> (iptcparse out-of-bounds read).</li> + <li><?php bugfix(67252); ?> (convert_uudecode out-of-bounds read).</li> + <li><?php bugfix(67359); ?> (Segfault in recursiveDirectoryIterator).</li> + <li><?php bugfix(67390); ?> (insecure temporary file use in the configure script). (CVE-2014-3981)</li> + <li><?php bugfix(67399); ?> (putenv with empty variable may lead to crash).</li> + <li><?php bugfix(67492); ?> (unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion) (CVE-2014-3515).</li> + <li><?php bugfix(67498); ?> (phpinfo() Type Confusion Information Leak Vulnerability).</li> +</li> +</ul></li> +<li>COM: +<ul> + <li>Fixed missing type checks in com_event_sink.</li> +</ul></li> +<li>Date: +<ul> + <li><?php bugfix(66060); ?> (Heap buffer over-read in DateInterval). (CVE-2013-6712)</li> + <li><?php bugfix(67251); ?> (date_parse_from_format out-of-bounds read).</li> + <li><?php bugfix(67253); ?> (timelib_meridian_with_check out-of-bounds read).</li> +</ul></li> +<li>Exif: +<ul> + <li><?php bugfix(65873); ?> (Integer overflow in exif_read_data()).</li> +</ul></li> +<li>Fileinfo: +<ul> + <li><?php bugfix(66307); ?> (Fileinfo crashes with powerpoint files).</li> + <li><?php bugfix(67326); ?> (fileinfo: cdf_read_short_sector insufficient boundary check). (CVE-2014-0207)</li> + <li><?php bugfix(67327); ?> (fileinfo: CDF infinite loop in nelements DoS). (CVE-2014-0238)</li> + <li><?php bugfix(67328); ?> (fileinfo: fileinfo: numerous file_printf calls resulting in performance degradation). (CVE-2014-0237)</li> + <li><?php bugfix(67410); ?> (fileinfo: mconvert incorrect handling of truncated pascal string size).</li> + <li><?php bugfix(67411); ?> (fileinfo: cdf_check_stream_offset insufficient boundary check).</li> + <li><?php bugfix(67412); ?> (fileinfo: cdf_count_chain insufficient boundary check).</li> + <li><?php bugfix(67413); ?> (fileinfo: cdf_read_property_info insufficient boundary check).</li> +</ul></li> +<li>Intl: +<ul> + <li><?php bugfix(67349); ?> (Locale::parseLocale Double Free).</li> + <li><?php bugfix(67397); ?> (Buffer overflow in locale_get_display_name and uloc_getDisplayName (libicu 4.8.1)).</li> +</ul></li> +<li>Network: +<ul> + <li><?php bugfix(67432); ?> (Fix potential segfault in dns_check_record()). (CVE-2014-4049)</li> +</ul></li> +<li>OpenSSL: +<ul> + <li>Fixed missing type checks in OpenSSL options.</li> +</ul></li> +<li>Session: +<ul> + <li>Fixed missing type checks in php_session_create_id.</li> +</ul></li> +</ul> +<!-- }}} --></section> + <section class="version" id="5.5.15"><!-- {{{ 5.5.15 --> <h3>Version 5.5.15</h3> <?php release_date('24-Jul-2014'); ?> diff --git a/include/releases.inc b/include/releases.inc index 072598e..621494a 100644 --- a/include/releases.inc +++ b/include/releases.inc @@ -1431,6 +1431,37 @@ $OLDRELEASES = array ( 'date' => '01 March 2012', 'museum' => true, ), + '5.3.28' => + array ( + 'announcement' => + array ( + 'English' => '/releases/5_3_28.php', + ), + 'source' => + array ( + 0 => + array ( + 'filename' => 'php-5.3.28.tar.bz2', + 'name' => 'PHP 5.3.28 (tar.bz2)', + 'md5' => '56ff88934e068d142d6c0deefd1f396b', + 'date' => '12 Dec 2013', + ), + 1 => + array ( + 'filename' => 'php-5.3.28.tar.gz', + 'name' => 'PHP 5.3.28 (tar.gz)', + 'md5' => 'eec3fb5ccb6d8c238f973d306bebb00e', + 'date' => '12 Dec 2013', + ), + 2 => + array ( + 'link' => 'http://windows.php.net/download/#php-5.3', + 'name' => 'Windows 5.3.28 binaries and source', + ), + ), + 'date' => '11 Jul 2013', + 'museum' => false, + ), '5.3.27' => array ( 'announcement' => diff --git a/include/version.inc b/include/version.inc index 62b54a3..6ecd788 100644 --- a/include/version.inc +++ b/include/version.inc @@ -37,15 +37,16 @@ $PHP_5_4_MD5 = array( ); /* PHP 5.3 Release */ -$PHP_5_3_RC = '5.3.29RC1'; // Current RC version (e.g., '5.6.7RC1') or false +$PHP_5_3_RC = false; //'5.3.29RC1'; // Current RC version (e.g., '5.6.7RC1') or false $PHP_5_3_RC_DATE = '31 Jul 2013'; -$PHP_5_3_VERSION = "5.3.28"; -$PHP_5_3_DATE = "12 Dec 2013"; +$PHP_5_3_VERSION = "5.3.29"; +$PHP_5_3_DATE = "14 Aug 2014"; $PHP_5_3_MD5 = array( - "tar.bz2" => "56ff88934e068d142d6c0deefd1f396b", - "tar.gz" => "eec3fb5ccb6d8c238f973d306bebb00e", + "tar.bz2" => "9469e240cbe6ac865aeaec89b253dd30", + "tar.gz" => "ebfa96ea636b2a7ece71e78ad116a338", + "tar.xz" => "dcff9c881fe436708c141cfc56358075" ); $RELEASES = array( -- PHP Webmaster List Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php
