Commit:    b62019cbbc6ab55e4379a315803fc83b604ebb4c
Author:    Anatol Belski <[email protected]>         Thu, 21 Jul 2016 12:16:22 +0200
Parents:   d4cc47cc1f4aee8bc8c3a82745080d16163d90f8
Branches:  master

Link:       
http://git.php.net/?p=web/php.git;a=commitdiff;h=b62019cbbc6ab55e4379a315803fc83b604ebb4c

Log:
7.0.9 announce

Changed paths:
  M  ChangeLog-7.php
  M  archive/archive.xml
  A  archive/entries/2016-07-21-3.xml
  M  include/releases.inc
  M  include/version.inc
  A  releases/7_0_9.php

diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index ffcc2c0..1bf59cb 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -7,6 +7,102 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 
 <h1>PHP 7 ChangeLog</h1>
 
+<section class="version" id="7.0.9"><!-- {{{ 7.0.9 -->
+<h3>Version 7.0.9</h3>
+<b><?php release_date('21-Jul-2016'); ?></b>
+<ul><li>Core:
+<ul>
+  <li><?php bugfix(72508); ?> (strange references after recursive function 
call and "switch" statement).</li>
+  <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in 
virtual_file_ex).</li>
+  <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP 
libraries and applications).</li>
+</ul></li>
+<li>bz2:
+<ul>
+  <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()).</li>
+</ul></li>
+<li>CLI:
+<ul>
+  <li><?php bugfix(72484); ?> (SCRIPT_FILENAME shows wrong path if the user 
specify router.php).</li>
+</ul></li>
+<li>COM:
+<ul>
+  <li><?php bugfix(72498); ?> (variant_date_from_timestamp null 
dereference).</li>
+</ul></li>
+<li>Curl:
+<ul>
+  <li><?php bugfix(72541); ?> (size_t overflow lead to heap corruption).</li>
+</ul></li>
+<li>Exif:
+<ul>
+  <li><?php bugfix(72603); ?> (Out of bound read in 
exif_process_IFD_in_MAKERNOTE).</li>
+  <li><?php bugfix(72618); ?> (NULL Pointer Dereference in 
exif_process_user_comment).</li>
+</ul></li>
+<li>GD:
+<ul>
+  <li><?php bugfix(43475); ?> (Thick styled lines have scrambled 
patterns).</li>
+  <li><?php bugfix(53640); ?> (XBM images require width to be multiple of 
8).</li>
+  <li><?php bugfix(64641); ?> (imagefilledpolygon doesn't draw horizontal 
line).</li>
+  <li><?php bugfix(72512); ?> (gdImageTrueColorToPaletteBody allows arbitrary 
write/read access).</li>
+  <li><?php bugfix(72519); ?> (imagegif/output out-of-bounds access).</li>
+  <li><?php bugfix(72558); ?> (Integer overflow error within 
_gdContributionsAlloc()).</li>
+  <li><?php bugfix(72482); ?> (Ilegal write/read access caused by 
gdImageAALine overflow).</li>
+  <li><?php bugfix(72494); ?> (imagecropauto out-of-bounds access).</li>
+</ul></li>
+<li>Intl:
+<ul>
+  <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds 
access).</li>
+</ul></li>
+<li>Mbstring:
+<ul>
+  <li><?php bugfix(72405); ?> (mb_ereg_replace - mbc_to_code (oniguruma) - oob 
read access).</li>
+  <li><?php bugfix(72399); ?> (Use-After-Free in MBString (search_re)).</li>
+</ul></li>
+<li>mcrypt:
+<ul>
+  <li><?php bugfix(72551); ?>, bug <?php bugl(72552) ?> (Incorrect casting 
from size_t to int lead to heap overflow in mdecrypt_generic).</li>
+</ul></li>
+<li>PDO_pgsql:
+<ul>
+  <li><?php bugfix(72570); ?> (Segmentation fault when binding parameters on a 
query without placeholders).</li>
+</ul></li>
+<li>PCRE:
+<ul>
+  <li><?php bugfix(72476); ?> (Memleak in jit_stack).</li>
+  <li><?php bugfix(72463); ?> (mail fails with invalid argument).</li>
+</ul></li>
+<li>Readline:
+<ul>
+  <li><?php bugfix(72538); ?> (readline_redisplay crashes php).</li>
+</ul></li>
+<li>Standard:
+<ul>
+  <li><?php bugfix(72505); ?> (readfile() mangles files larger than 2G).</li>
+  <li><?php bugfix(72306); ?> (Heap overflow through proc_open and $env 
parameter).</li>
+</ul></li>
+<li>Session:
+<ul>
+  <li><?php bugfix(72531); ?> (ps_files_cleanup_dir Buffer overflow).</li>
+  <li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected 
Session Deserialization).</li>
+</ul></li>
+<li>SNMP:
+<ul>
+  <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC 
and unserialize()).</li>
+</ul></li>
+<li>Streams:
+<ul>
+  <li><?php bugfix(72439); ?> (Stream socket with remote address leads to a 
segmentation fault).</li>
+</ul></li>
+<li>XMLRPC:
+<ul>
+  <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn 
simplestring.c).</li>
+</ul></li>
+<li>Zip:
+<ul>
+  <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in 
php_stream_zip_opener).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
 <section class="version" id="7.0.8"><!-- {{{ 7.0.8 -->
 <h3>Version 7.0.8</h3>
 <b><?php release_date('23-Jun-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index c7ac0be..124054f 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
     <uri>http://php.net/contact</uri>
     <email>[email protected]</email>
   </author>
+  <xi:include href="entries/2016-07-21-3.xml"/>
   <xi:include href="entries/2016-07-21-1.xml"/>
   <xi:include href="entries/2016-07-07-1.xml"/>
   <xi:include href="entries/2016-06-24-1.xml"/>
diff --git a/archive/entries/2016-07-21-3.xml b/archive/entries/2016-07-21-3.xml
new file mode 100644
index 0000000..34b8bcd
--- /dev/null
+++ b/archive/entries/2016-07-21-3.xml
@@ -0,0 +1,25 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom";>
+  <title>PHP 7.0.9 Released</title>
+  <id>http://php.net/archive/2016.php#id2016-07-21-3</id>
+  <published>2016-07-21T13:00:00+01:00</published>
+  <updated>2016-07-21T13:00:00+01:00</updated>
+  <category term="releases" label="New PHP release"/>
+  <category term="frontpage" label="PHP.net frontpage news"/>
+  <link href="http://php.net/index.php#id2016-07-21-3"; rel="alternate" 
type="text/html"/>
+  <link href="http://php.net/archive/2016.php#id2016-07-21-3"; rel="via" 
type="text/html"/>
+  <content type="xhtml">
+    <div xmlns="http://www.w3.org/1999/xhtml";>
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.9. This is a security release. Several security bugs were fixed in
+     this release, including the HTTP_PROXY issue.
+     
+     All PHP 7.0 users are encouraged to upgrade to this version.</p>
+     
+     <p>For source downloads of PHP 7.0.9 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.9";>ChangeLog</a>.
+     </p>
+    </div>
+  </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index 088afdc..0d59a2b 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,42 @@
 $OLDRELEASES = array (
   7 => 
   array (
+    '7.0.8' => 
+    array (
+      'announcement' => 
+      array (
+        'English' => '/releases/7_0_8.php',
+      ),
+      'source' => 
+      array (
+        0 => 
+        array (
+          'filename' => 'php-7.0.8.tar.bz2',
+          'name' => 'PHP 7.0.8 (tar.bz2)',
+          'md5' => 'd4f67b081a3c1b0b35f729ef8131cdda',
+          'sha256' => 
'66dc7ba388490e07b1313fe3a06b1fa822e1310585fe29f4909995f131e27c8d',
+          'date' => '23 Jun 2016',
+        ),
+        1 => 
+        array (
+          'filename' => 'php-7.0.8.tar.gz',
+          'name' => 'PHP 7.0.8 (tar.gz)',
+          'md5' => '642d86f3269404abc1bbfd887b682ccf',
+          'sha256' => 
'1f024fa6d87594b99fa312e3185c357dcffa42e07d21c726f41d1fa6f773720b',
+          'date' => '23 Jun 2016',
+        ),
+        2 => 
+        array (
+          'filename' => 'php-7.0.8.tar.xz',
+          'name' => 'PHP 7.0.8 (tar.xz)',
+          'md5' => 'c4438583c95d3ddf746929d7fcb61045',
+          'sha256' => 
'0a2142c458b0846f556b16da1c927d74c101aa951bb840549abe5c58584fb394',
+          'date' => '23 Jun 2016',
+        ),
+      ),
+      'date' => '23 Jun 2016',
+      'museum' => false,
+    ),
     '7.0.7' => 
     array (
       'announcement' => 
diff --git a/include/version.inc b/include/version.inc
index 5e34a28..3641e76 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -18,20 +18,20 @@
  */
 
 /* PHP 7.0 Release */
-$PHP_7_0_RC = "7.0.9RC1"; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
 $PHP_7_0_RC_DATE = '07 Jul 2016';
 
-$PHP_7_0_VERSION         = "7.0.8";
-$PHP_7_0_DATE            = "23 Jun 2016";
+$PHP_7_0_VERSION         = "7.0.9";
+$PHP_7_0_DATE            = "21 Jul 2016";
 $PHP_7_0_MD5     = array(
-                       "tar.bz2"       => "d4f67b081a3c1b0b35f729ef8131cdda",
-                       "tar.gz"        => "642d86f3269404abc1bbfd887b682ccf",
-                       "tar.xz"        => "c4438583c95d3ddf746929d7fcb61045",
+                       "tar.bz2"       => "63b32d3e97df7b30c2bcd138ef0b21c0",
+                       "tar.gz"        => "32ea3ce54d7d5ed03c6c600dffd65813",
+                       "tar.xz"        => "6294813fb3c8158cfde74302f573cac7",
 );
 $PHP_7_0_SHA256     = array(
-                       "tar.bz2"       => 
"66dc7ba388490e07b1313fe3a06b1fa822e1310585fe29f4909995f131e27c8d",
-                       "tar.gz"        => 
"1f024fa6d87594b99fa312e3185c357dcffa42e07d21c726f41d1fa6f773720b",
-                       "tar.xz"        => 
"0a2142c458b0846f556b16da1c927d74c101aa951bb840549abe5c58584fb394",
+                       "tar.bz2"       => 
"2ee6968b5875f2f38700c58a189aad859a6a0b85fc337aa102ec2dc3652c3b7b",
+                       "tar.gz"        => 
"93895a6a610c94751c890e5ee91a7f4bc0eae476b95fe30425d13f7ae88753d5",
+                       "tar.xz"        => 
"970c322ba3e472cb0264b8ba9d4d92e87918da5d0cca53c4aba2a70545b8626d",
 );
 
 /* PHP 5.6 Release */
diff --git a/releases/7_0_9.php b/releases/7_0_9.php
new file mode 100644
index 0000000..bc353d7
--- /dev/null
+++ b/releases/7_0_9.php
@@ -0,0 +1,22 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/7_0_9.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 7.0.9 Release Announcement");
+?>
+
+     <h1>PHP 7.0.9 Release Announcement</h1>
+     
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.9. This is a security release. Several security bugs were fixed in
+     this release, including the HTTP_PROXY issue. 
+     
+     All PHP 7.0 users are encouraged to upgrade to this version.
+     </p>
+     
+     <p>For source downloads of PHP 7.0.9 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.9";>ChangeLog</a>.
+     </p>
+
+<?php site_footer(); ?>
-- 
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to