Commit: ca55104ae262d35cfd6864e6968648cb1f568445
Author: kovacs.ferenc <[email protected]> Fri, 19 Aug 2016
01:47:33 +0200
Parents: 3eba7bb46503699f9a688c6fdac8b033934eab25
Branches: master
Link:
http://git.php.net/?p=web/php.git;a=commitdiff;h=ca55104ae262d35cfd6864e6968648cb1f568445
Log:
announce 5.6.25
Changed paths:
M ChangeLog-5.php
M archive/archive.xml
A archive/entries/2016-08-18-2.xml
M include/releases.inc
M include/version.inc
A releases/5_6_25.php
diff --git a/ChangeLog-5.php b/ChangeLog-5.php
index 44559b3..188c493 100644
--- a/ChangeLog-5.php
+++ b/ChangeLog-5.php
@@ -7,6 +7,132 @@ site_header("PHP 5 ChangeLog", array("current" => "docs",
"css" => array("change
?>
<h1>PHP 5 ChangeLog</h1>
+<section class="version" id="5.6.25"><!-- {{{ 5.6.25 -->
+<h3>Version 5.6.25</h3>
+<b><?php release_date('18-Aug-2016'); ?></b>
+<ul><li>Bz2:
+<ul>
+ <li><?php bugfix(72837); ?> (integer overflow in bzdecompress caused heap
corruption).</li>
+</ul></li>
+<li>Core:
+<ul>
+ <li><?php bugfix(70436); ?> (Use After Free Vulnerability in
unserialize()).</li>
+ <li><?php bugfix(72024); ?> (microtime() leaks memory).</li>
+ <li><?php bugfix(72581); ?> (previous property undefined in Exception after
deserialization).</li>
+ <li>Implemented FR <?php bugl(72614); ?> (Support "nmake test" on building
extensions by phpize).</li>
+ <li><?php bugfix(72641); ?> (phpize (on Windows) ignores PHP_PREFIX).</li>
+ <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke
__wakeup() in Deserialization).</li>
+ <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability).</li>
+</ul></li>
+<li>Calendar:
+<ul>
+ <li><?php bugfix(67976); ?> (cal_days_month() fails for final month of the
French calendar).</li>
+ <li><?php bugfix(71894); ?> (AddressSanitizer: global-buffer-overflow in
zif_cal_from_jd).</li>
+</ul></li>
+<li>Curl:
+<ul>
+ <li><?php bugfix(71144); ?> (Segmentation fault when using cURL with
ZTS).</li>
+ <li><?php bugfix(71929); ?> (Certification information (CERTINFO) data
parsing error).</li>
+ <li><?php bugfix(72807); ?> (integer overflow in curl_escape caused heap
corruption).</li>
+</ul></li>
+<li>DOM:
+<ul>
+ <li><?php bugfix(66502); ?> (DOM document dangling reference).</li>
+</ul></li>
+<li>Ereg:
+<ul>
+ <li><?php bugfix(72838); ?> (Integer overflow lead to heap corruption in
sql_regcase).</li>
+</ul></li>
+<li>EXIF:
+<ul>
+ <li><?php bugfix(72627); ?> (Memory Leakage In
exif_process_IFD_in_TIFF).</li>
+ <li><?php bugfix(72735); ?> (Samsung picture thumb not read (zero
size)).</li>
+</ul></li>
+<li>Filter:
+<ul>
+ <li><?php bugfix(71745); ?> (FILTER_FLAG_NO_RES_RANGE does not cover whole
127.0.0.0/8 range).</li>
+</ul></li>
+<li>FPM:
+<ul>
+ <li><?php bugfix(72575); ?> (using --allow-to-run-as-root should ignore
missing user).</li>
+</ul></li>
+<li>GD:
+<ul>
+ <li><?php bugfix(43828); ?> (broken transparency of imagearc for truecolor
in blendingmode).</li>
+ <li><?php bugfix(66555); ?> (Always false condition in
ext/gd/libgd/gdkanji.c).</li>
+ <li><?php bugfix(68712); ?> (suspicious if-else statements).</li>
+ <li><?php bugfix(70315); ?> (500 Server Error but page is fully
rendered).</li>
+ <li><?php bugfix(72596); ?> (imagetypes function won't advertise WEBP
support).</li>
+ <li><?php bugfix(72604); ?> (imagearc() ignores thickness for full
arcs).</li>
+ <li><?php bugfix(72697); ?> (select_colors write out-of-bounds).</li>
+ <li><?php bugfix(72709); ?> (imagesetstyle() causes OOB read for empty
$styles).</li>
+ <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write
access).</li>
+</ul></li>
+<li>Intl:
+<ul>
+ <li>Partially fixed <?php bugl(72506); ?> (idn_to_ascii for UTS #46
incorrect for long domain names).</li>
+</ul></li>
+<li>mbstring:
+<ul>
+ <li><?php bugfix(72691); ?> (mb_ereg_search raises a warning if a match
zero-width).</li>
+ <li><?php bugfix(72693); ?> (mb_ereg_search increments search position when
a match zero-width).</li>
+ <li><?php bugfix(72694); ?> (mb_ereg_search_setpos does not accept a
string's last position).</li>
+ <li><?php bugfix(72710); ?> (`mb_ereg` causes buffer overflow on regexp
compile error).</li>
+</ul></li>
+<li>PCRE:
+<ul>
+ <li><?php bugfix(72688); ?> (preg_match missing group names in matches).</li>
+</ul></li>
+<li>PDO_pgsql:
+<ul>
+ <li><?php bugfix(70313); ?> (PDO statement fails to throw exception).</li>
+</ul></li>
+<li>Reflection:
+<ul>
+ <li><?php bugfix(72222); ?> (ReflectionClass::export doesn't handle array
constants).</li>
+</ul></li>
+<li>SNMP:
+<ul>
+ <li><?php bugfix(72708); ?> (php_snmp_parse_oid integer overflow in memory
allocation).</li>
+</ul></li>
+<li>Standard:
+<ul>
+ <li><?php bugfix(72330); ?> (CSV fields incorrectly split if escape char
followed by UTF chars).</li>
+ <li><?php bugfix(72836); ?> (integer overflow in base64_decode).</li>
+ <li><?php bugfix(72848); ?> (integer overflow in
quoted_printable_encode).</li>
+ <li><?php bugfix(72849); ?> (integer overflow in urlencode).</li>
+ <li><?php bugfix(72850); ?> (integer overflow in php_uuencode).</li>
+ <li><?php bugfix(72716); ?> (initialize buffer before read).</li>
+</ul></li>
+<li>Streams:
+<ul>
+ <li><?php bugfix(41021); ?> (Problems with the ftps wrapper).</li>
+ <li><?php bugfix(54431); ?> (opendir() does not work with ftps://
wrapper).</li>
+ <li><?php bugfix(72667); ?> (opendir() with ftp:// attempts to open data
stream for non-existent directories).</li>
+ <li><?php bugfix(72764); ?> (ftps:// opendir wrapper data channel encryption
fails with IIS FTP 7.5, 8.5).</li>
+ <li><?php bugfix(72771); ?> (ftps:// wrapper is vulnerable to protocol
downgrade attack).</li>
+</ul></li>
+<li>SPL:
+<ul>
+ <li><?php bugfix(72122); ?> (IteratorIterator breaks '@' error
suppression).</li>
+ <li><?php bugfix(72646); ?> (SplFileObject::getCsvControl does not return
the escape character).</li>
+ <li><?php bugfix(72684); ?> (AppendIterator segfault with closed
generator).</li>
+</ul></li>
+<li>SQLite3:
+<ul>
+ <li>Implemented FR <?php bugl(72653); ?> (SQLite should allow opening with
empty filename).</li>
+</ul></li>
+<li>Wddx:
+<ul>
+ <li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in
wddx_serialize_value()).</li>
+ <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access)
(Stas)</li>
+ <li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li>
+ <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid
xml).</li>
+ <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in
php_wddx_pop_element).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
<section class="version" id="5.6.24"><!-- {{{ 5.6.24 -->
<h3>Version 5.6.24</h3>
<b><?php release_date('21-Jul-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index cdc681f..cc5e826 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>[email protected]</email>
</author>
+ <xi:include href="entries/2016-08-18-2.xml"/>
<xi:include href="entries/2016-08-18-1.xml"/>
<xi:include href="entries/2016-08-16-2.xml"/>
<xi:include href="entries/2016-08-16-1.xml"/>
diff --git a/archive/entries/2016-08-18-2.xml b/archive/entries/2016-08-18-2.xml
new file mode 100644
index 0000000..acc7bca
--- /dev/null
+++ b/archive/entries/2016-08-18-2.xml
@@ -0,0 +1,25 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>PHP 5.6.25 is released</title>
+ <id>http://php.net/archive/2016.php#id2016-08-18-2</id>
+ <published>2016-08-18T16:43:25-07:00</published>
+ <updated>2016-08-18T16:43:25-07:00</updated>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <category term="releases" label="New PHP release"/>
+ <link href="http://php.net/index.php#id2016-08-18-2" rel="alternate"
type="text/html"/>
+ <link href="http://php.net/archive/2016.php#id2016-08-18-2" rel="via"
type="text/html"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.6.25. This is a security release. Several security bugs were fixed in
+ this release.
+
+ All PHP 5.6 users are encouraged to upgrade to this version.</p>
+
+ <p>For source downloads of PHP 5.6.25 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-5.php#5.6.25">ChangeLog</a>.
+ </p>
+ </div>
+ </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index 8f5e052..0466f88 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -365,6 +365,42 @@ $OLDRELEASES = array (
),
5 =>
array (
+ '5.6.24' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/5_6_24.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-5.6.24.tar.bz2',
+ 'name' => 'PHP 5.6.24 (tar.bz2)',
+ 'md5' => '2ab124d58b7b763ca453f6a18ec3866b',
+ 'sha256' =>
'bf23617ec3ed0a125ec8bde2b7bca9d3804b2ff4df8de192890c84dc9fac38c6',
+ 'date' => '21 Jul 2016',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-5.6.24.tar.gz',
+ 'name' => 'PHP 5.6.24 (tar.gz)',
+ 'md5' => 'dfa2e90085516cc817a8a9568e2a374e',
+ 'sha256' =>
'5f8b2e4e00360fee6eb1b89447266ae45993265955bd1ea9866270d75cdb6ec1',
+ 'date' => '21 Jul 2016',
+ ),
+ 2 =>
+ array (
+ 'filename' => 'php-5.6.24.tar.xz',
+ 'name' => 'PHP 5.6.24 (tar.xz)',
+ 'md5' => '3ef6e3573698b9b444be88edd3b23494',
+ 'sha256' =>
'ed7c38c6dac539ade62e08118258f4dac0c49beca04d8603bee4e0ea6ca8250b',
+ 'date' => '21 Jul 2016',
+ ),
+ ),
+ 'date' => '21 Jul 2016',
+ 'museum' => false,
+ ),
'5.6.23' =>
array (
'announcement' =>
diff --git a/include/version.inc b/include/version.inc
index 3271f3a..8e7bc8a 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -38,17 +38,17 @@ $PHP_7_0_SHA256 = array(
$PHP_5_6_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
$PHP_5_6_RC_DATE = '07 Jul 2016';
-$PHP_5_6_VERSION = "5.6.24";
-$PHP_5_6_DATE = "21 Jul 2016";
+$PHP_5_6_VERSION = "5.6.25";
+$PHP_5_6_DATE = "18 Aug 2016";
$PHP_5_6_MD5 = array(
- "tar.bz2" => "2ab124d58b7b763ca453f6a18ec3866b",
- "tar.gz" => "dfa2e90085516cc817a8a9568e2a374e",
- "tar.xz" => "3ef6e3573698b9b444be88edd3b23494",
+ "tar.bz2" => "f63b9956c25f1ae0433015a80b44224c",
+ "tar.gz" => "75f90f5bd7d0076a0dcc5f3205ce260e",
+ "tar.xz" => "81cb8c0de0d0b714587edbd27a2a75bb",
);
$PHP_5_6_SHA256 = array(
- "tar.bz2" =>
"bf23617ec3ed0a125ec8bde2b7bca9d3804b2ff4df8de192890c84dc9fac38c6",
- "tar.gz" =>
"5f8b2e4e00360fee6eb1b89447266ae45993265955bd1ea9866270d75cdb6ec1",
- "tar.xz" =>
"ed7c38c6dac539ade62e08118258f4dac0c49beca04d8603bee4e0ea6ca8250b",
+ "tar.bz2" =>
"58ce6032aced7f3e42ced492bd9820e5b3f2a3cd3ef71429aa92fd7b3eb18dde",
+ "tar.gz" =>
"733f1c811d51c2d4031a0c058dc94d09d03858d781ca2eb2cce78853bc76db58",
+ "tar.xz" =>
"7535cd6e20040ccec4594cc386c6f15c3f2c88f24163294a31068cf7dfe7f644",
);
/* PHP 5.5 Release */
$PHP_5_5_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
diff --git a/releases/5_6_25.php b/releases/5_6_25.php
new file mode 100644
index 0000000..bcdef2b
--- /dev/null
+++ b/releases/5_6_25.php
@@ -0,0 +1,22 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/5_6_25.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 5.6.25 Release Announcement");
+?>
+
+ <h1>PHP 5.6.25 Release Announcement</h1>
+
+ <p>The PHP development team announces the immediate availability of PHP
+ 5.6.25. This is a security release. Several security bugs were fixed in
+ this release.
+
+ All PHP 5.6 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>For source downloads of PHP 5.6.25 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-5.php#5.6.25">ChangeLog</a>.
+ </p>
+
+<?php site_footer(); ?>--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php