Commit:    985c343bb008a8f753cc3b623eda53491131e8e6
Author:    Anatol Belski <[email protected]>         Fri, 29 Apr 2016 01:18:32 +0200
Parents:   79524c69996238de8accb5f1e9ad3d131ee1a81b
Branches:  master

Link:       
http://git.php.net/?p=web/php.git;a=commitdiff;h=985c343bb008a8f753cc3b623eda53491131e8e6

Log:
7.0.6 announce

Changed paths:
  M  ChangeLog-7.php
  M  archive/archive.xml
  A  archive/entries/2016-04-29-1.xml
  M  include/releases.inc
  M  include/version.inc
  A  releases/7_0_6.php

diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 88302c4..29252d7 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -7,6 +7,121 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 
 <h1>PHP 7 ChangeLog</h1>
 
+<section class="version" id="7.0.6"><!-- {{{ 7.0.6 -->
+<h3>Version 7.0.6</h3>
+<b><?php release_date('28-Apr-2016'); ?></b>
+<ul><li>Core:
+<ul>
+  <li><?php bugfix(71930); ?> (_zval_dtor_func: Assertion 
`(arr)-&gt;gc.refcount &lt;= 1' failed).</li>
+  <li><?php bugfix(71922); ?> (Crash on assert(new class{})).</li>
+  <li><?php bugfix(71914); ?> (Reference is lost in "switch").</li>
+  <li><?php bugfix(71871); ?> (Interfaces allow final and abstract 
functions).</li>
+  <li><?php bugfix(71859); ?> (zend_objects_store_call_destructors operates on 
realloced memory, crashing).</li>
+  <li><?php bugfix(71841); ?> (EG(error_zval) is not handled well).</li>
+  <li><?php bugfix(71750); ?> (Multiple Heap Overflows in php_raw_url_encode/ 
php_url_encode).</li>
+  <li><?php bugfix(71731); ?> (Null coalescing operator and ArrayAccess).</li>
+  <li><?php bugfix(71609); ?> (Segmentation fault on ZTS with 
gethostbyname).</li>
+  <li><?php bugfix(71428); ?> (inheritance and allow_null).</li>
+  <li><?php bugfix(71414); ?> (Inheritance, traits and interfaces).</li>
+  <li><?php bugfix(71359); ?> (Null coalescing operator and magic).</li>
+  <li><?php bugfix(71334); ?> (Cannot access array keys while uksort()).</li>
+  <li><?php bugfix(69659); ?> (ArrayAccess, isset() and the offsetExists 
method).</li>
+  <li><?php bugfix(69537); ?> (__debugInfo with empty string for key gives 
error).</li>
+  <li><?php bugfix(62059); ?> (ArrayObject and isset are not friends).</li>
+  <li><?php bugfix(71980); ?> (Decorated/Nested Generator is Uncloseable in 
Finally).</li>
+</ul></li>
+<li>BCmath:
+<ul>
+  <li><?php bugfix(72093); ?> (bcpowmod accepts negative scale and corrupts 
_one_ definition).</li>
+</ul></li>
+<li>Curl:
+<ul>
+  <li><?php bugfix(71831); ?> (CURLOPT_NOPROXY applied as long instead of 
string).</li>
+</ul></li>
+<li>Date:
+<ul>
+  <li><?php bugfix(71889); ?> (DateInterval::format Segmentation fault).</li>
+</ul></li>
+<li>EXIF:
+<ul>
+  <li><?php bugfix(72094); ?> (Out of bounds heap read access in exif header 
processing).</li>
+</ul></li>
+<li>GD:
+<ul>
+  <li><?php bugfix(71912); ?> (libgd: signedness vulnerability). 
(CVE-2016-3074)</li>
+</ul></li>
+<li>Intl:
+<ul>
+  <li><?php bugfix(71516); ?> (IntlDateFormatter looses locale if pattern is 
set via constructor).</li>
+  <li><?php bugfix(70455); ?> (Missing constant: 
IntlChar::NO_NUMERIC_VALUE).</li>
+  <li><?php bugfix(70451); ?>, #70452 (Inconsistencies in return values of 
IntlChar methods).</li>
+  <li><?php bugfix(68893); ?> (Stackoverflow in datefmt_create).</li>
+  <li><?php bugfix(66289); ?> (Locale::lookup incorrectly returns en or en_US 
if locale is empty).</li>
+  <li><?php bugfix(70484); ?> (selectordinal doesn't work with named 
parameters).</li>
+  <li><?php bugfix(72061); ?> (Out-of-bounds reads in zif_grapheme_stripos 
with negative offset).</li>
+</ul></li>
+<li>ODBC:
+<ul>
+  <li><?php bugfix(63171); ?> (Script hangs after max_execution_time).</li>
+</ul></li>
+<li>Opcache:
+<ul>
+  <li><?php bugfix(71843); ?> (null ptr deref 
ZEND_RETURN_SPEC_CONST_HANDLER).</li>
+</ul></li>
+<li>PDO:
+<ul>
+  <li><?php bugfix(52098); ?> (Own PDOStatement implementation ignore 
__call()).</li>
+  <li><?php bugfix(71447); ?> (Quotes inside comments not properly 
handled).</li>
+</ul></li>
+<li>PDO_DBlib:
+<ul>
+  <li><?php bugfix(71943); ?> (dblib_handle_quoter needs to allocate an extra 
byte).</li>
+  <li>Add DBLIB-specific attributes for controlling timeouts.</li>
+</ul></li>
+<li>PDO_pgsql:
+<ul>
+  <li><?php bugfix(62498); ?> (pdo_pgsql inefficient when getColumnMeta() is 
used).</li>
+</ul></li>
+<li>Postgres:
+<ul>
+  <li><?php bugfix(71820); ?> (pg_fetch_object binds parameters before call 
constructor).</li>
+  <li><?php bugfix(71998); ?> (Function pg_insert does not insert when column 
type = inet).</li>
+</ul></li>
+<li>SOAP:
+<ul>
+  <li><?php bugfix(71986); ?> (Nested foreach assign-by-reference creates 
broken variables).</li>
+</ul></li>
+<li>SPL:
+<ul>
+  <li><?php bugfix(71838); ?> (Deserializing serialized 
SPLObjectStorage-Object can't access properties in PHP).</li>
+  <li><?php bugfix(71735); ?> (Double-free in 
SplDoublyLinkedList::offsetSet).</li>
+  <li><?php bugfix(67582); ?> (Cloned SplObjectStorage with overwritten 
getHash fails offsetExists()).</li>
+  <li><?php bugfix(52339); ?> (SPL autoloader breaks class_exists()).</li>
+</ul></li>
+<li>Standard:
+<ul>
+  <li><?php bugfix(72116); ?> (array_fill optimization breaks 
implementation).</li>
+  <li><?php bugfix(71995); ?> (Returning the same var twice from __sleep() 
produces broken serialized data).</li>
+  <li><?php bugfix(71940); ?> (Unserialize crushes on restore object 
reference).</li>
+  <li><?php bugfix(71969); ?> (str_replace returns an incorrect resulting 
array after a foreach by reference).</li>
+  <li><?php bugfix(71891); ?> (header_register_callback() and 
register_shutdown_function()).</li>
+  <li><?php bugfix(71884); ?> (Null pointer deref (segfault) in 
stream_context_get_default).</li>
+  <li><?php bugfix(71840); ?> (Unserialize accepts wrongly data).</li>
+  <li><?php bugfix(71837); ?> (Wrong arrays behaviour).</li>
+  <li><?php bugfix(71827); ?> (substr_replace bug, string length).</li>
+  <li><?php bugfix(67512); ?> (php_crypt() crashes if crypt_r() does not exist 
or _REENTRANT is not defined).</li>
+</ul></li>
+<li>XML:
+<ul>
+  <li><?php bugfix(72099); ?> (xml_parse_into_struct segmentation fault).</li>
+</ul></li>
+<li>Zip:
+<ul>
+  <li><?php bugfix(71923); ?> (integer overflow in ZipArchive::getFrom*). 
(CVE-2016-3078)</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
 <section class="version" id="7.0.5"><!-- {{{ 7.0.5 -->
 <h3>Version 7.0.5</h3>
 <b><?php release_date('31-Mar-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index aa44c79..cdae727 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
     <uri>http://php.net/contact</uri>
     <email>[email protected]</email>
   </author>
+  <xi:include href="entries/2016-04-29-1.xml"/>
   <xi:include href="entries/2016-04-28-2.xml"/>
   <xi:include href="entries/2016-04-28-1.xml"/>
   <xi:include href="entries/2016-04-18-1.xml"/>
diff --git a/archive/entries/2016-04-29-1.xml b/archive/entries/2016-04-29-1.xml
new file mode 100644
index 0000000..60ed4aa
--- /dev/null
+++ b/archive/entries/2016-04-29-1.xml
@@ -0,0 +1,31 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom";>
+  <title>PHP 7.0.6 Released</title>
+  <id>http://php.net/archive/2016.php#id2016-04-29-1</id>
+  <published>2016-04-29T02:30:00+01:00</published>
+  <updated>2016-04-29T02:30:00+01:00</updated>
+  <category term="releases" label="New PHP release"/>
+  <category term="frontpage" label="PHP.net frontpage news"/>
+  <link href="http://php.net/index.php#id2016-04-29-1"; rel="alternate" 
type="text/html"/>
+  <link href="http://php.net/archive/2016.php#id2016-04-29-1"; rel="via" 
type="text/html"/>
+  <content type="xhtml">
+    <div xmlns="http://www.w3.org/1999/xhtml";>
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.6. This is a security release. Several security bugs were fixed in
+     this release, including
+     </p>
+     <ul>
+         <li>CVE-2016-3078</li>
+         <li>CVE-2016-3074</li>
+     </ul>
+     <p>
+     All PHP 7.0 users are encouraged to upgrade to this version.
+     </p>
+     
+     <p>For source downloads of PHP 7.0.6 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.6";>ChangeLog</a>.
+     </p>
+    </div>
+  </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index fc86f83..0c1da62 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,42 @@
 $OLDRELEASES = array (
   7 => 
   array (
+    '7.0.5' => 
+    array (
+      'announcement' => 
+      array (
+        'English' => '/releases/7_0_5.php',
+      ),
+      'source' => 
+      array (
+        0 => 
+        array (
+          'filename' => 'php-7.0.5.tar.bz2',
+          'name' => 'PHP 7.0.5 (tar.bz2)',
+          'md5' => 'b15e6836babcbf0aa446678ee38f896b',
+          'sha256' => 
'2c09af7fe64537ea795f098b9b542ead407ef83f7cdc65b3787115ccbbb51de9',
+          'date' => '31 Mar 2016',
+        ),
+        1 => 
+        array (
+          'filename' => 'php-7.0.5.tar.gz',
+          'name' => 'PHP 7.0.5 (tar.gz)',
+          'md5' => 'c8379f3875caf95ce14266ca8212eb4e',
+          'sha256' => 
'f9d93419031b4df663fc48f03b8a833545de8776225e46637563e2be6029908d',
+          'date' => '31 Mar 2016',
+        ),
+        2 => 
+        array (
+          'filename' => 'php-7.0.5.tar.xz',
+          'name' => 'PHP 7.0.5 (tar.xz)',
+          'md5' => 'dcaaf14356875b80f937cc6700c58acb',
+          'sha256' => 
'c41f1a03c24119c0dd9b741cdb67880486e64349fc33527767f6dc28d3803abb',
+          'date' => '31 Mar 2016',
+        ),
+      ),
+      'date' => '31 Mar 2016',
+      'museum' => false,
+    ),
     '7.0.4' => 
     array (
       'announcement' => 
diff --git a/include/version.inc b/include/version.inc
index ebf3c17..faad506 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -19,20 +19,20 @@
  */
 
 /* PHP 7.0 Release */
-$PHP_7_0_RC = "7.0.6RC1"; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
 $PHP_7_0_RC_DATE = '14 Apr 2016';
 
-$PHP_7_0_VERSION         = "7.0.5";
-$PHP_7_0_DATE            = "31 Mar 2016";
+$PHP_7_0_VERSION         = "7.0.6";
+$PHP_7_0_DATE            = "28 Apr 2016";
 $PHP_7_0_MD5     = array(
-                       "tar.bz2"       => "b15e6836babcbf0aa446678ee38f896b",
-                       "tar.gz"        => "c8379f3875caf95ce14266ca8212eb4e",
-                       "tar.xz"        => "dcaaf14356875b80f937cc6700c58acb",
+                       "tar.bz2"       => "c89a1046ff06f6aff699057376e297b6",
+                       "tar.gz"        => "c9e2ff2d6f843a584179ce96e63e38f9",
+                       "tar.xz"        => "5f0c5d999a6b5c700b31fd9618d5651d",
 );
 $PHP_7_0_SHA256     = array(
-                       "tar.bz2"       => 
"2c09af7fe64537ea795f098b9b542ead407ef83f7cdc65b3787115ccbbb51de9",
-                       "tar.gz"        => 
"f9d93419031b4df663fc48f03b8a833545de8776225e46637563e2be6029908d",
-                       "tar.xz"        => 
"c41f1a03c24119c0dd9b741cdb67880486e64349fc33527767f6dc28d3803abb",
+                       "tar.bz2"       => 
"14ddf192a9965c858c1e742a61456be2f34a4db87556172c0d76f08de96329b7",
+                       "tar.gz"        => 
"f6b47cb3e02530d96787ae5c7888aefbd1db6ae4164d68b88808ee6f4da94277",
+                       "tar.xz"        => 
"1b237a9455e5476a425dbb9d99966bad68107747c601958cb9558a7fb49ab419",
 );
 
 /* PHP 5.6 Release */
diff --git a/releases/7_0_6.php b/releases/7_0_6.php
new file mode 100644
index 0000000..f9eb27f
--- /dev/null
+++ b/releases/7_0_6.php
@@ -0,0 +1,26 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/7_0_6.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 7.0.6 Release Announcement");
+?>
+
+     <h1>PHP 7.0.6 Release Announcement</h1>
+     
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.6. This is a security release. Several security bugs were fixed in
+     this release, including</p>
+     <ul>
+         <li>CVE-2016-3078</li>
+         <li>CVE-2016-3074</li>
+     </ul>
+     <p>
+     All PHP 7.0 users are encouraged to upgrade to this version.
+     </p>
+     
+     <p>For source downloads of PHP 7.0.6 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.6";>ChangeLog</a>.
+     </p>
+
+<?php site_footer(); ?>
-- 
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to