Commit: 941b8daebc83f492fbcbd664592c06b2dc5b7c17
Author: Christoph M. Becker <[email protected]> Thu, 20 Feb 2020
10:40:34 +0100
Parents: 13d4a4190447ca4584e19a39b0458fde7170e04b
Branches: master
Link:
http://git.php.net/?p=web/php.git;a=commitdiff;h=941b8daebc83f492fbcbd664592c06b2dc5b7c17
Log:
Announce 7.3.15
Changed paths:
M ChangeLog-7.php
M archive/archive.xml
A archive/entries/2020-02-20-2.xml
M include/releases.inc
M include/version.inc
A releases/7_3_15.php
diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 266509993..3c849a337 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -574,6 +574,75 @@ site_header("PHP 7 ChangeLog", array("current" => "docs",
"css" => array("change
<a name="PHP_7_3"></a>
+<section class="version" id="7.3.15"><!-- {{{ 7.3.15 -->
+<h3>Version 7.3.15</h3>
+<b><?php release_date('20-Feb-2020'); ?></b>
+<ul><li>Core:
+<ul>
+ <li><?php bugfix(71876); ?> (Memory corruption htmlspecialchars(): charset
`*' not supported).</li>
+ <li><?php bugfix(79146); ?> (cscript can fail to run on some systems).</li>
+ <li><?php bugfix(78323); ?> (Code 0 is returned on invalid options).</li>
+ <li><?php bugfix(76047); ?> (Use-after-free when accessing already
destructed backtrace arguments).</li>
+</ul></li>
+<li>CURL:
+<ul>
+ <li><?php bugfix(79078); ?> (Hypothetical use-after-free in
curl_multi_add_handle()).</li>
+</ul></li>
+<li>Intl:
+<ul>
+ <li><?php bugfix(79212); ?> (NumberFormatter::format() may detect wrong
type).</li>
+</ul></li>
+<li>Libxml:
+<ul>
+ <li><?php bugfix(79191); ?> (Error in SoapClient ctor disables
DOMDocument::save()).</li>
+</ul></li>
+<li>MBString:
+<ul>
+ <li><?php bugfix(79154); ?> (mb_convert_encoding() can modify
$from_encoding).</li>
+</ul></li>
+<li>MySQLnd:
+<ul>
+ <li><?php bugfix(79084); ?> (mysqlnd may fetch wrong column indexes with
MYSQLI_BOTH).</li>
+</ul></li>
+<li>OpenSSL:
+<ul>
+ <li><?php bugfix(79145); ?> (openssl memory leak).</li>
+</ul></li>
+<li>Phar:
+<ul>
+ <li><?php bugfix(79082); ?> (Files added to tar with Phar::buildFromIterator
have all-access permissions). (CVE-2020-7063)</li>
+ <li><?php bugfix(79171); ?> (heap-buffer-overflow in phar_extract_file).
(CVE-2020-7061)</li>
+ <li><?php bugfix(76584); ?> (PharFileInfo::decompress not working).</li>
+</ul></li>
+<li>Reflection:
+<ul>
+ <li><?php bugfix(79115); ?> (ReflectionClass::isCloneable call reflected
class __destruct).</li>
+</ul></li>
+<li>Session:
+<ul>
+ <li><?php bugfix(79221); ?> (Null Pointer Dereference in PHP Session Upload
Progress). (CVE-2020-7062)</li>
+</ul></li>
+<li>SPL:
+<ul>
+ <li><?php bugfix(79151); ?> (heap use after free caused by
spl_dllist_it_helper_move_forward).</li>
+</ul></li>
+<li>Standard:
+<ul>
+ <li><?php bugfix(78902); ?> (Memory leak when using
stream_filter_append).</li>
+</ul></li>
+<li>Testing:
+<ul>
+ <li><?php bugfix(78090); ?> (bug45161.phpt takes forever to finish).</li>
+</ul></li>
+<li>XSL:
+<ul>
+ <li><?php bugfix(70078); ?> (XSL callbacks with nodes as parameter leak
memory).</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
+
+
<section class="version" id="7.3.14"><!-- {{{ 7.3.14 -->
<h3>Version 7.3.14</h3>
<b><?php release_date('23-Jan-2020'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index 033c27b3a..bd7eb6450 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>[email protected]</email>
</author>
+ <xi:include href="entries/2020-02-20-2.xml"/>
<xi:include href="entries/2020-02-20-1.xml"/>
<xi:include href="entries/2020-02-17-1.xml"/>
<xi:include href="entries/2020-01-30-1.xml"/>
diff --git a/archive/entries/2020-02-20-2.xml b/archive/entries/2020-02-20-2.xml
new file mode 100644
index 000000000..d2fe1242a
--- /dev/null
+++ b/archive/entries/2020-02-20-2.xml
@@ -0,0 +1,24 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>PHP 7.3.15 Released</title>
+ <id>https://www.php.net/archive/2020.php#2020-02-20-2</id>
+ <published>2020-02-20T09:32:08+00:00</published>
+ <updated>2020-02-20T09:32:08+00:00</updated>
+ <link href="https://www.php.net/index.php#id2020-02-20-2" rel="alternate"
type="text/html"/>
+ <link href="https://www.php.net/archive/2020.php#2020-02-20-2" rel="via"
type="text/html"/>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <category term="releases" label="New PHP release"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.3.15. This is a security release which also contains several bug
fixes.</p>
+
+ <p>All PHP 7.3 users are encouraged to upgrade to this version.</p>
+
+ <p>For source downloads of PHP 7.3.15 please visit our <a
href="https://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="https://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="https://www.php.net/ChangeLog-7.php#7.3.15">ChangeLog</a>.
+ </p>
+ </div>
+ </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index c5a0cd887..d8789a3e2 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,43 @@
$OLDRELEASES = array (
7 =>
array (
+ '7.4.2' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/7_4_2.php',
+ ),
+ 'tags' =>
+ array (
+ 0 => 'security',
+ ),
+ 'date' => '23 Jan 2020',
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-7.4.2.tar.bz2',
+ 'name' => 'PHP 7.4.2 (tar.bz2)',
+ 'sha256' =>
'02909974be9c70814ed5652a6bdae9c74220d41c1e5ed5ad921e15d028f8e816',
+ 'date' => '23 Jan 2020',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-7.4.2.tar.gz',
+ 'name' => 'PHP 7.4.2 (tar.gz)',
+ 'sha256' =>
'e1b8dbf561ac1d871362054ff4cd62dca5e19c8c896567996525dda7c4b320f9',
+ 'date' => '23 Jan 2020',
+ ),
+ 2 =>
+ array (
+ 'filename' => 'php-7.4.2.tar.xz',
+ 'name' => 'PHP 7.4.2 (tar.xz)',
+ 'sha256' =>
'98284deac017da0d426117ecae7599a1f1bf62ae3911e8bc16c4403a8f4bdf13',
+ 'date' => '23 Jan 2020',
+ ),
+ ),
+ 'museum' => false,
+ ),
'7.2.27' =>
array (
'announcement' =>
diff --git a/include/version.inc b/include/version.inc
index 75c2f0808..3659df442 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -27,13 +27,13 @@ $RELEASES = (function() {
);
/* PHP 7.3 Release */
- $PHP_7_3_VERSION = "7.3.14";
- $PHP_7_3_DATE = "23 Jan 2020";
+ $PHP_7_3_VERSION = "7.3.15";
+ $PHP_7_3_DATE = "20 Feb 2020";
$PHP_7_3_TAGS = ['security']; // Set to ['security'] for
security releases.
$PHP_7_3_SHA256 = array(
- "tar.bz2" =>
"b9dfcbbbc929ce67995f976de8636c5f46804593ecae6e110509329b9dc6c272",
- "tar.gz" =>
"6aff532a380b0f30c9e295b67dc91d023fee3b0ae14b4771468bf5dda4cbf108",
- "tar.xz" =>
"cc05dd373ca5d36652800762f65c10e828a17de35aaf246262e3efa99d00cdb0",
+ "tar.bz2" =>
"8dbe1507ea0035f4211faa0db80fe95f39df0e39d8408223820fe9123487043d",
+ "tar.gz" =>
"c606dd09de2edff1e6b6c5b9f0076214a59f6f1a3272e15d681ed16257737ef6",
+ "tar.xz" =>
"de7ae7cf3d1dbb2824975b26b32991dac2b732886ec22075b8c53b261b018166",
);
/* PHP 7.2 Release */
diff --git a/releases/7_3_15.php b/releases/7_3_15.php
new file mode 100644
index 000000000..05ae2592e
--- /dev/null
+++ b/releases/7_3_15.php
@@ -0,0 +1,19 @@
+<?php
+$_SERVER['BASE_PAGE'] = 'releases/7_3_15.php';
+include_once __DIR__ . '/../include/prepend.inc';
+site_header("PHP 7.3.15 Release Announcement");
+?>
+
+ <h1>PHP 7.3.15 Release Announcement</h1>
+
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.3.15. This is a security release which also contains several bug fixes.</p>
+
+ <p>All PHP 7.3 users are encouraged to upgrade to this version.</p>
+
+ <p>For source downloads of PHP 7.3.15 please visit our <a
href="https://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="https://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="https://www.php.net/ChangeLog-7.php#7.3.15">ChangeLog</a>.
+ </p>
+
+<?php site_footer(); ?>
--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php