Commit:    4b21542f06fdcc6681f7ef37e57f52f3e00cd204
Author:    Anatol Belski <[email protected]>         Thu, 18 Aug 2016 22:54:51 +0200
Parents:   76170c1614459c86077a516c0182059a3de6f672
Branches:  master

Link:       
http://git.php.net/?p=web/php.git;a=commitdiff;h=4b21542f06fdcc6681f7ef37e57f52f3e00cd204

Log:
7.0.10 announce

Changed paths:
  M  ChangeLog-7.php
  M  archive/archive.xml
  A  archive/entries/2016-08-18-1.xml
  M  include/releases.inc
  M  include/version.inc
  A  releases/7_0_10.php

diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 1bf59cb..1a79936 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -7,6 +7,161 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 
 <h1>PHP 7 ChangeLog</h1>
 
+<section class="version" id="7.0.10"><!-- {{{ 7.0.10 -->
+<h3>Version 7.0.10</h3>
+<b><?php release_date('18-Aug-2016'); ?></b>
+<ul><li>Core:
+<ul>
+  <li><?php bugfix(72629); ?> (Caught exception assignment to variables 
ignores references).</li>
+  <li><?php bugfix(72594); ?> (Calling an earlier instance of an included 
anonymous class fatals).</li>
+  <li><?php bugfix(72581); ?> (previous property undefined in Exception after 
deserialization).</li>
+  <li><?php bugfix(72496); ?> (Cannot declare public method with signature 
incompatible with parent private method).</li>
+  <li><?php bugfix(72024); ?> (microtime() leaks memory).</li>
+  <li><?php bugfix(71911); ?> (Unable to set --enable-debug on building 
extensions by phpize on Windows).</li>
+  <li>Fixed bug causing ClosedGeneratorException being thrown into the calling 
code instead of the Generator yielding from.</li>
+  <li>Implemented FR <?php bugl(72614); ?> (Support "nmake test" on building 
extensions by phpize).</li>
+  <li><?php bugfix(72641); ?> (phpize (on Windows) ignores PHP_PREFIX).</li>
+  <li>Fixed potential segfault in object storage freeing in shutdown 
sequence.</li>
+  <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke 
__wakeup() in Deserialization).</li>
+  <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability).</li>
+  <li><?php bugfix(72683); ?> (getmxrr broken).</li>
+  <li><?php bugfix(72742); ?> (memory allocator fails to realloc small block 
to large one).</li>
+</ul></li>
+<li>Bz2:
+<ul>
+  <li><?php bugfix(72837); ?> (integer overflow in bzdecompress caused heap 
corruption).</li>
+</ul></li>
+<li>Calendar:
+<ul>
+  <li><?php bugfix(67976); ?> (cal_days_month() fails for final month of the 
French calendar).</li>
+  <li><?php bugfix(71894); ?> (AddressSanitizer: global-buffer-overflow in 
zif_cal_from_jd).</li>
+</ul></li>
+<li>COM:
+<ul>
+  <li><?php bugfix(72569); ?> (DOTNET/COM array parameters broke in PHP7).</li>
+</ul></li>
+<li>CURL:
+<ul>
+  <li><?php bugfix(71709); ?> (curl_setopt segfault with empty 
CURLOPT_HTTPHEADER).</li>
+  <li><?php bugfix(71929); ?> (CURLINFO_CERTINFO data parsing error).</li>
+  <li><?php bugfix(72674); ?> (Heap overflow in curl_escape).</li>
+</ul></li>
+<li>DOM:
+<ul>
+  <li><?php bugfix(66502); ?> (DOM document dangling reference).</li>
+</ul></li>
+<li>EXIF:
+<ul>
+  <li><?php bugfix(72735); ?> (Samsung picture thumb not read (zero 
size)).</li>
+  <li><?php bugfix(72627); ?> (Memory Leakage In 
exif_process_IFD_in_TIFF).</li>
+</ul></li>
+<li>Filter:
+<ul>
+  <li><?php bugfix(71745); ?> (FILTER_FLAG_NO_RES_RANGE does not cover whole 
127.0.0.0/8 range).</li>
+</ul></li>
+<li>FPM:
+<ul>
+  <li><?php bugfix(72575); ?> (using --allow-to-run-as-root should ignore 
missing user).</li>
+</ul></li>
+<li>GD:
+<ul>
+  <li><?php bugfix(72596); ?> (imagetypes function won't advertise WEBP 
support).</li>
+  <li><?php bugfix(72604); ?> (imagearc() ignores thickness for full 
arcs).</li>
+  <li><?php bugfix(70315); ?> (500 Server Error but page is fully 
rendered).</li>
+  <li><?php bugfix(43828); ?> (broken transparency of imagearc for truecolor 
in blendingmode).</li>
+  <li><?php bugfix(66555); ?> (Always false condition in 
ext/gd/libgd/gdkanji.c).</li>
+  <li><?php bugfix(68712); ?> (suspicious if-else statements).</li>
+  <li><?php bugfix(72697); ?> (select_colors write out-of-bounds).</li>
+  <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write 
access).</li>
+</ul></li>
+<li>Intl:
+<ul>
+  <li><?php bugfix(72639); ?> (Segfault when instantiating class that extends 
IntlCalendar and adds a property).</li>
+  <li>Partially fixed <?php bugfix(72506); ?> (idn_to_ascii for UTS #46 
incorrect for long domain names).</li>
+</ul></li>
+<li>mbstring:
+<ul>
+  <li><?php bugfix(72691); ?> (mb_ereg_search raises a warning if a match 
zero-width).</li>
+  <li><?php bugfix(72693); ?> (mb_ereg_search increments search position when 
a match zero-width).</li>
+  <li><?php bugfix(72694); ?> (mb_ereg_search_setpos does not accept a 
string's last position).</li>
+  <li><?php bugfix(72710); ?> (`mb_ereg` causes buffer overflow on regexp 
compile error).</li>
+</ul></li>
+<li>Mcrypt:
+<ul>
+  <li><?php bugfix(72782); ?> (Heap Overflow due to integer overflows).</li>
+</ul></li>
+<li>Opcache:
+<ul>
+  <li><?php bugfix(72590); ?> (Opcache restart with kill_all_lockers does not 
work).</li>
+</ul></li>
+<li>PCRE:
+<ul>
+  <li><?php bugfix(72688); ?> (preg_match missing group names in matches).</li>
+</ul></li>
+<li>PDO_pgsql:
+<ul>
+  <li><?php bugfix(70313); ?> (PDO statement fails to throw exception).</li>
+</ul></li>
+<li>Reflection:
+<ul>
+  <li><?php bugfix(72222); ?> (ReflectionClass::export doesn't handle array 
constants).</li>
+</ul></li>
+<li>SimpleXML:
+<ul>
+  <li><?php bugfix(72588); ?> (Using global var doesn't work while accessing 
SimpleXML element).</li>
+</ul></li>
+<li>SNMP:
+<ul>
+  <li><?php bugfix(72708); ?> (php_snmp_parse_oid integer overflow in memory 
allocation).</li>
+</ul></li>
+<li>SPL:
+<ul>
+  <li><?php bugfix(55701); ?> (GlobIterator throws LogicException).</li>
+  <li><?php bugfix(72646); ?> (SplFileObject::getCsvControl does not return 
the escape character).</li>
+  <li><?php bugfix(72684); ?> (AppendIterator segfault with closed 
generator).</li>
+</ul></li>
+<li>SQLite3:
+<ul>
+  <li><?php bugfix(72668); ?> (Spurious warning when exception is thrown in 
user defined function).</li>
+  <li><?php bugfix(72571); ?> (SQLite3::bindValue, SQLite3::bindParam 
crash).</li>
+  <li>Implemented FR <?php bugl(72653); ?> (SQLite should allow opening with 
empty filename).</li>
+  <li>Updated to SQLite3 3.13.0.</li>
+</ul></li>
+<li>Standard:
+<ul>
+  <li><?php bugfix(72622); ?> (array_walk + array_replace_recursive create 
references from nothing).</li>
+  <li><?php bugfix(72152); ?> (base64_decode $strict fails to detect null 
byte).</li>
+  <li><?php bugfix(72263); ?> (base64_decode skips a character after padding 
in strict mode).</li>
+  <li><?php bugfix(72264); ?> (base64_decode $strict fails with whitespace 
between padding).</li>
+  <li><?php bugfix(72330); ?> (CSV fields incorrectly split if escape char 
followed by UTF chars).</li>
+</ul></li>
+<li>Streams:
+<ul>
+  <li><?php bugfix(41021); ?> (Problems with the ftps wrapper).</li>
+  <li><?php bugfix(54431); ?> (opendir() does not work with ftps:// 
wrapper).</li>
+  <li><?php bugfix(72667); ?> (opendir() with ftp:// attempts to open data 
stream for non-existent directories).</li>
+  <li><?php bugfix(72771); ?> (ftps:// wrapper is vulnerable to protocol 
downgrade attack).</li>
+</ul></li>
+<li>XMLRPC:
+<ul>
+  <li><?php bugfix(72647); ?> (xmlrpc_encode() unexpected output after 
referencing array elements).</li>
+</ul></li>
+<li>Wddx:
+<ul>
+  <li><?php bugfix(72564); ?> (boolean always deserialized as "true") 
(Remi)</li>
+  <li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in 
wddx_serialize_value()).</li>
+  <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access) 
(Stas)</li>
+  <li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li>
+  <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid 
xml).</li>
+  <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in 
php_wddx_pop_element).</li>
+</ul></li>
+<li>Zip:
+<ul>
+  <li><?php bugfix(72660); ?> (NULL Pointer dereference in 
zend_virtual_cwd).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
 <section class="version" id="7.0.9"><!-- {{{ 7.0.9 -->
 <h3>Version 7.0.9</h3>
 <b><?php release_date('21-Jul-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index 494082c..cdc681f 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
     <uri>http://php.net/contact</uri>
     <email>[email protected]</email>
   </author>
+  <xi:include href="entries/2016-08-18-1.xml"/>
   <xi:include href="entries/2016-08-16-2.xml"/>
   <xi:include href="entries/2016-08-16-1.xml"/>
   <xi:include href="entries/2016-08-04-1.xml"/>
diff --git a/archive/entries/2016-08-18-1.xml b/archive/entries/2016-08-18-1.xml
new file mode 100644
index 0000000..fe9f08c
--- /dev/null
+++ b/archive/entries/2016-08-18-1.xml
@@ -0,0 +1,25 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom";>
+  <title>PHP 7.0.10 Released</title>
+  <id>http://php.net/archive/2016.php#id2016-08-18-1</id>
+  <published>2016-08-18T23:59:00+01:00</published>
+  <updated>2016-08-18T23:59:00+01:00</updated>
+  <category term="releases" label="New PHP release"/>
+  <category term="frontpage" label="PHP.net frontpage news"/>
+  <link href="http://php.net/index.php#id2016-08-18-1"; rel="alternate" 
type="text/html"/>
+  <link href="http://php.net/archive/2016.php#id2016-08-18-1"; rel="via" 
type="text/html"/>
+  <content type="xhtml">
+    <div xmlns="http://www.w3.org/1999/xhtml";>
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.10. This is a security release. Several security bugs were fixed in
+     this release.
+     
+     All PHP 7.0 users are encouraged to upgrade to this version.</p>
+     
+     <p>For source downloads of PHP 7.0.10 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.10";>ChangeLog</a>.
+     </p>
+    </div>
+  </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index 4d46094..8f5e052 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,42 @@
 $OLDRELEASES = array (
   7 => 
   array (
+    '7.0.9' => 
+    array (
+      'announcement' => 
+      array (
+        'English' => '/releases/7_0_9.php',
+      ),
+      'source' => 
+      array (
+        0 => 
+        array (
+          'filename' => 'php-7.0.9.tar.bz2',
+          'name' => 'PHP 7.0.9 (tar.bz2)',
+          'md5' => '63b32d3e97df7b30c2bcd138ef0b21c0',
+          'sha256' => 
'2ee6968b5875f2f38700c58a189aad859a6a0b85fc337aa102ec2dc3652c3b7b',
+          'date' => '21 Jul 2016',
+        ),
+        1 => 
+        array (
+          'filename' => 'php-7.0.9.tar.gz',
+          'name' => 'PHP 7.0.9 (tar.gz)',
+          'md5' => '32ea3ce54d7d5ed03c6c600dffd65813',
+          'sha256' => 
'93895a6a610c94751c890e5ee91a7f4bc0eae476b95fe30425d13f7ae88753d5',
+          'date' => '21 Jul 2016',
+        ),
+        2 => 
+        array (
+          'filename' => 'php-7.0.9.tar.xz',
+          'name' => 'PHP 7.0.9 (tar.xz)',
+          'md5' => '6294813fb3c8158cfde74302f573cac7',
+          'sha256' => 
'970c322ba3e472cb0264b8ba9d4d92e87918da5d0cca53c4aba2a70545b8626d',
+          'date' => '21 Jul 2016',
+        ),
+      ),
+      'date' => '21 Jul 2016',
+      'museum' => false,
+    ),
     '7.0.8' => 
     array (
       'announcement' => 
diff --git a/include/version.inc b/include/version.inc
index 8c2834e..3271f3a 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -18,20 +18,20 @@
  */
 
 /* PHP 7.0 Release */
-$PHP_7_0_RC = "7.0.10RC1"; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
 $PHP_7_0_RC_DATE = '04 Aug 2016';
 
-$PHP_7_0_VERSION         = "7.0.9";
-$PHP_7_0_DATE            = "21 Jul 2016";
+$PHP_7_0_VERSION         = "7.0.10";
+$PHP_7_0_DATE            = "18 Aug 2016";
 $PHP_7_0_MD5     = array(
-                       "tar.bz2"       => "63b32d3e97df7b30c2bcd138ef0b21c0",
-                       "tar.gz"        => "32ea3ce54d7d5ed03c6c600dffd65813",
-                       "tar.xz"        => "6294813fb3c8158cfde74302f573cac7",
+                       "tar.bz2"       => "cd1d27be3f522b0543e43c8c2b7116e4",
+                       "tar.gz"        => "e02b20546a227d23ce147e5a566c73b5",
+                       "tar.xz"        => "6f087f16514b6c442e8009a5828827b7",
 );
 $PHP_7_0_SHA256     = array(
-                       "tar.bz2"       => 
"2ee6968b5875f2f38700c58a189aad859a6a0b85fc337aa102ec2dc3652c3b7b",
-                       "tar.gz"        => 
"93895a6a610c94751c890e5ee91a7f4bc0eae476b95fe30425d13f7ae88753d5",
-                       "tar.xz"        => 
"970c322ba3e472cb0264b8ba9d4d92e87918da5d0cca53c4aba2a70545b8626d",
+                       "tar.bz2"       => 
"8055bbe5a736986931c0c6a08b765d6d778271ec7d2d56c50a1ad259ec09f6de",
+                       "tar.gz"        => 
"46216e05db09c0fffbf832e3b64f3722ccbdd6d4ae16d9791e41adf0a4b00641",
+                       "tar.xz"        => 
"348476ff7ba8d95a1e28e1059430c10470c5f8110f6d9133d30153dda4cdf56a",
 );
 
 /* PHP 5.6 Release */
diff --git a/releases/7_0_10.php b/releases/7_0_10.php
new file mode 100644
index 0000000..58e42fe
--- /dev/null
+++ b/releases/7_0_10.php
@@ -0,0 +1,22 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/7_0_10.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 7.0.10 Release Announcement");
+?>
+
+     <h1>PHP 7.0.10 Release Announcement</h1>
+     
+     <p>The PHP development team announces the immediate availability of PHP
+     7.0.10. This is a security release. Several security bugs were fixed in
+     this release.
+     
+     All PHP 7.0 users are encouraged to upgrade to this version.
+     </p>
+     
+     <p>For source downloads of PHP 7.0.10 please visit our <a 
href="http://www.php.net/downloads.php";>downloads page</a>,
+     Windows source and binaries can be found on <a 
href="http://windows.php.net/download/";>windows.php.net/download/</a>.
+     The list of changes is recorded in the <a 
href="http://www.php.net/ChangeLog-7.php#7.0.10";>ChangeLog</a>.
+     </p>
+
+<?php site_footer(); ?>
-- 
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to