Commit: 50098e43b0de457fa1cbf6672a615cb2d851ca00
Author: Anatol Belski <[email protected]> Thu, 4 Feb 2016 11:07:26 +0100
Parents: 2a5d3e47fae06be2ebdc0e2c61a721dd9e676502
Branches: master
Link:
http://git.php.net/?p=web/php.git;a=commitdiff;h=50098e43b0de457fa1cbf6672a615cb2d851ca00
Log:
announce 7.0.3
Changed paths:
M ChangeLog-7.php
M archive/archive.xml
A archive/entries/2016-02-04-1.xml
M include/releases.inc
M include/version.inc
A releases/7_0_3.php
diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 838a7e8..9c0783e 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -7,6 +7,85 @@ site_header("PHP 7 ChangeLog", array("current" => "docs",
"css" => array("change
<h1>PHP 7 ChangeLog</h1>
+<section class="version" id="7.0.3"><!-- {{{ 7.0.3 -->
+<h3>Version 7.0.3</h3>
+<b><?php release_date('04-Feb-2016'); ?></b>
+<ul><li>Core:
+<ul>
+ <li>Added support for new HTTP 451 code.</li>
+ <li><?php bugfix(71039); ?> (exec functions ignore length but look for NULL
termination).</li>
+ <li><?php bugfix(71089); ?> (No check to duplicate zend_extension).</li>
+ <li><?php bugfix(71201); ?> (round() segfault on 64-bit builds).</li>
+ <li><?php bugfix(71221); ?> (Null pointer deref (segfault) in
get_defined_vars via ob_start).</li>
+ <li><?php bugfix(71248); ?> (Wrong interface is enforced).</li>
+ <li><?php bugfix(71273); ?> (A wrong ext directory setup in php.ini leads to
crash).</li>
+ <li><?php bugfix(71275); ?> (Bad method called on cloning an object having a
trait).</li>
+ <li><?php bugfix(71297); ?> (Memory leak with consecutive yield from).</li>
+ <li><?php bugfix(71300); ?> (Segfault in zend_fetch_string_offset).</li>
+ <li><?php bugfix(71314); ?> (var_export(INF) prints INF.0).</li>
+ <li><?php bugfix(71323); ?> (Output of stream_get_meta_data can be falsified
by its input).</li>
+ <li><?php bugfix(71336); ?> (Wrong is_ref on properties as exposed via
get_object_vars()).</li>
+ <li><?php bugfix(71459); ?> (Integer overflow in iptcembed()).</li>
+</ul></li>
+<li>Apache2handler:
+<ul>
+ <li>Fix >2G Content-Length headers in apache2handler.</li>
+</ul></li>
+<li>CURL:
+<ul>
+ <li><?php bugfix(71227); ?> (Can't compile php_curl statically).</li>
+ <li><?php bugfix(71225); ?> (curl_setopt() fails to set CURLOPT_POSTFIELDS
with reference to CURLFile).</li>
+</ul></li>
+<li>Interbase:
+<ul>
+ <li><?php bugfix(71305); ?> (Crash when optional resource is omitted).</li>
+</ul></li>
+<li>LDAP:
+<ul>
+ <li><?php bugfix(71249); ?> (ldap_mod_replace/ldap_mod_add store value as
string "Array").</li>
+</ul></li>
+<li>mbstring:
+<ul>
+ <li><?php bugfix(71397); ?> (mb_send_mail segmentation fault).</li>
+</ul></li>
+<li>OpenSSL:
+<ul>
+ <li><?php bugfix(71475); ?> (openssl_seal() uninitialized memory usage).</li>
+</ul></li>
+<li>Phar:
+<ul>
+ <li><?php bugfix(71354); ?> (Heap corruption in tar/zip/phar parser).</li>
+ <li><?php bugfix(71391); ?> (NULL Pointer Dereference in
phar_tar_setupmetadata()).</li>
+ <li><?php bugfix(71488); ?> (Stack overflow when decompressing tar
archives).</li>
+</ul></li>
+<li>SOAP:
+<ul>
+ <li><?php bugfix(70979); ?> (crash with bad soap request).</li>
+</ul></li>
+<li>SPL:
+<ul>
+ <li><?php bugfix(71204); ?> (segfault if clean spl_autoload_funcs while
autoloading).</li>
+ <li><?php bugfix(71202); ?> (Autoload function registered by another not
activated immediately).</li>
+ <li><?php bugfix(71311); ?> (Use-after-free vulnerability in
SPL(ArrayObject, unserialize)).</li>
+ <li><?php bugfix(71313); ?> (Use-after-free vulnerability in
SPL(SplObjectStorage, unserialize)).</li>
+</ul></li>
+<li>Standard:
+<ul>
+ <li><?php bugfix(71287); ?> (Error message contains hexadecimal instead of
decimal number).</li>
+ <li><?php bugfix(71264); ?> (file_put_contents() returns unexpected value
when filesystem runs full).</li>
+ <li><?php bugfix(71245); ?> (file_get_contents() ignores "header" context
option if it's a reference).</li>
+ <li><?php bugfix(71220); ?> (Null pointer deref (segfault) in compact via
ob_start).</li>
+ <li><?php bugfix(71190); ?> (substr_replace converts integers in original
$search array to strings).</li>
+ <li><?php bugfix(71188); ?> (str_replace converts integers in original
$search array to strings).</li>
+ <li><?php bugfix(71132); ?>, #71197 (range() segfaults).</li>
+</ul></li>
+<li>WDDX:
+<ul>
+ <li><?php bugfix(71335); ?> (Type Confusion in WDDX Packet
Deserialization).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
<section class="version" id="7.0.2"><!-- {{{ 7.0.2 -->
<h3>Version 7.0.2</h3>
<b><?php release_date('07-Jan-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index 3bd3a6d..64e4f15 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>[email protected]</email>
</author>
+ <xi:include href="entries/2016-02-04-1.xml"/>
<xi:include href="entries/2016-01-30-1.xml"/>
<xi:include href="entries/2016-01-07-3.xml"/>
<xi:include href="entries/2016-01-07-2.xml"/>
diff --git a/archive/entries/2016-02-04-1.xml b/archive/entries/2016-02-04-1.xml
new file mode 100644
index 0000000..341e7de
--- /dev/null
+++ b/archive/entries/2016-02-04-1.xml
@@ -0,0 +1,26 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>PHP 7.0.3 Released</title>
+ <id>http://php.net/archive/2016.php#id2016-02-04-1</id>
+ <published>2016-02-04T13:00:00+01:00</published>
+ <updated>2016-02-04T13:00:00+01:00</updated>
+ <category term="releases" label="New PHP release"/>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <link href="http://php.net/index.php#id2016-02-04-1" rel="alternate"
type="text/html"/>
+ <link href="http://php.net/archive/2016.php#id2016-02-04-1" rel="via"
type="text/html"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.0.3. This is a security release. Several security bugs were fixed in
+ this release.
+
+ All PHP 7.0 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>For source downloads of PHP 7.0.3 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-7.php#7.0.3">ChangeLog</a>.
+ </p>
+ </div>
+ </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index ceee2e7..1947234 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,42 @@
$OLDRELEASES = array (
7 =>
array (
+ '7.0.2' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/7_0_2.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-7.0.2.tar.bz2',
+ 'name' => 'PHP 7.0.2 (tar.bz2)',
+ 'md5' => '8c71b2ffd29311e4b7ac7788bd107554',
+ 'sha256' =>
'9b1b75fbd9c92c6b0003b234e550965038826d11ea1f430bf279964da9da2236',
+ 'date' => '07 Jan 2015',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-7.0.2.tar.gz',
+ 'name' => 'PHP 7.0.2 (tar.gz)',
+ 'md5' => '992667cdad38c5f77a4bb6c62c9a942f',
+ 'sha256' =>
'040198aef3dc5f17c253c1282160aabc6a05ca0b18b3d6fc9213970363083412',
+ 'date' => '07 Jan 2015',
+ ),
+ 2 =>
+ array (
+ 'filename' => 'php-7.0.2.tar.xz',
+ 'name' => 'PHP 7.0.2 (tar.xz)',
+ 'md5' => 'ce5964672e4ec0b66ff088a6bafde8c7',
+ 'sha256' =>
'556121271a34c442b48e3d7fa3d3bbb4413d91897abbb92aaeced4a7df5f2ab2',
+ 'date' => '07 Jan 2015',
+ ),
+ ),
+ 'date' => '07 Jan 2015',
+ 'museum' => false,
+ ),
'7.0.1' =>
array (
'announcement' =>
diff --git a/include/version.inc b/include/version.inc
index 4d41c02..6997378 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -19,20 +19,20 @@
*/
/* PHP 7.0 Release */
-$PHP_7_0_RC = "7.0.3RC1"; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
$PHP_7_0_RC_DATE = '21 Jan 2016';
-$PHP_7_0_VERSION = "7.0.2";
-$PHP_7_0_DATE = "07 Jan 2016";
+$PHP_7_0_VERSION = "7.0.3";
+$PHP_7_0_DATE = "04 Feb 2016";
$PHP_7_0_MD5 = array(
- "tar.bz2" => "8c71b2ffd29311e4b7ac7788bd107554",
- "tar.gz" => "992667cdad38c5f77a4bb6c62c9a942f",
- "tar.xz" => "ce5964672e4ec0b66ff088a6bafde8c7",
+ "tar.bz2" => "702e9b8e2cb704fdd50137e39f53f50b",
+ "tar.gz" => "235b1217a9ec7bee6e0bd517e3636d45",
+ "tar.xz" => "3c5d2b5b392b78fa92c48822e25ccb56",
);
$PHP_7_0_SHA256 = array(
- "tar.bz2" =>
"9b1b75fbd9c92c6b0003b234e550965038826d11ea1f430bf279964da9da2236",
- "tar.gz" =>
"040198aef3dc5f17c253c1282160aabc6a05ca0b18b3d6fc9213970363083412",
- "tar.xz" =>
"556121271a34c442b48e3d7fa3d3bbb4413d91897abbb92aaeced4a7df5f2ab2",
+ "tar.bz2" =>
"826823d754f09c779222a99becf9c53a4dc719dba2d777aca7807c6ca68e6fc6",
+ "tar.gz" =>
"5521df8db153aba35c90cf1a1829106b6bbdac32425216d440f9cc29f00a7c08",
+ "tar.xz" =>
"3af2b62617a0e46214500fc3e7f4a421067224913070844d3665d6cc925a1cca",
);
/* PHP 5.6 Release */
diff --git a/releases/7_0_3.php b/releases/7_0_3.php
new file mode 100644
index 0000000..a9b04f5
--- /dev/null
+++ b/releases/7_0_3.php
@@ -0,0 +1,22 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/7_0_3.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 7.0.3 Release Announcement");
+?>
+
+ <h1>PHP 7.0.3 Release Announcement</h1>
+
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.0.3. This is a security release. Several security bugs were fixed in
+ this release.
+
+ All PHP 7.0 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>For source downloads of PHP 7.0.3 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-7.php#7.0.3">ChangeLog</a>.
+ </p>
+
+<?php site_footer(); ?>--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php