|
7 | 7 | ?>
|
8 | 8 |
|
9 | 9 | <h1>PHP 5 ChangeLog</h1>
|
10 |
| -<section class="version" id="5.5.37"><!-- {{{ 5.5.37 --> |
11 |
| -<h3>Version 5.5.37</h3> |
| 10 | +<section class="version" id="5.6.23"><!-- {{{ 5.6.23 --> |
| 11 | +<h3>Version 5.6.23</h3> |
12 | 12 | <b><?php release_date('23-Jun-2016'); ?></b>
|
13 | 13 | <ul><li>Core:
|
14 | 14 | <ul>
|
|
19 | 19 | </ul></li>
|
20 | 20 | <li>GD:
|
21 | 21 | <ul>
|
22 |
| - <li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder) (CVE-2015-8874).</li> |
| 22 | + <li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li> |
23 | 23 | <li><?php bugfix(72298); ?> (pass2_no_dither out-of-bounds access).</li>
|
24 |
| - <li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow).</li> |
| 24 | + <li><?php bugfix(72337); ?> (invalid dimensions can lead to crash).</li> |
| 25 | + <li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow). (CVE-2016-5766)</li> |
25 | 26 | <li><?php bugfix(72407); ?> (NULL Pointer Dereference at _gdScaleVert).</li>
|
26 |
| - <li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow).</li> |
| 27 | + <li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow). (CVE-2016-5767)</li> |
| 28 | +</ul></li> |
| 29 | +<li>Intl: |
| 30 | +<ul> |
| 31 | + <li><?php bugfix(70484); ?> (selectordinal doesn't work with named parameters).</li> |
27 | 32 | </ul></li>
|
28 | 33 | <li>mbstring:
|
29 | 34 | <ul>
|
30 |
| - <li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free).</li> |
| 35 | + <li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free). (CVE-2016-5768)</li> |
31 | 36 | </ul></li>
|
32 | 37 | <li>mcrypt:
|
33 | 38 | <ul>
|
34 |
| - <li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows).</li> |
| 39 | + <li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows). (CVE-2016-5769)</li> |
| 40 | +</ul></li> |
| 41 | +<li>OpenSSL: |
| 42 | +<ul> |
| 43 | + <li><?php bugfix(72140); ?> (segfault after calling ERR_free_strings()).</li> |
| 44 | +</ul></li> |
| 45 | +<li>Phar: |
| 46 | +<ul> |
| 47 | + <li><?php bugfix(72321); ?> (invalid free in phar_extract_file()).</li> |
35 | 48 | </ul></li>
|
36 | 49 | <li>SPL:
|
37 | 50 | <ul>
|
38 |
| - <li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread).</li> |
39 |
| - <li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize).</li> |
| 51 | + <li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread). (CVE-2016-5770)</li> |
| 52 | + <li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5771)</li> |
40 | 53 | </ul></li>
|
41 | 54 | <li>WDDX:
|
42 | 55 | <ul>
|
43 |
| - <li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize).</li> |
| 56 | + <li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize). (CVE-2016-5772)</li> |
44 | 57 | </ul></li>
|
45 | 58 | <li>zip:
|
46 | 59 | <ul>
|
47 |
| - <li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize).</li> |
| 60 | + <li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)</li> |
48 | 61 | </ul></li>
|
49 | 62 | </ul>
|
50 | 63 | <!-- }}} --></section>
|
51 | 64 |
|
52 |
| -<section class="version" id="5.6.23"><!-- {{{ 5.6.23 --> |
53 |
| -<h3>Version 5.6.23</h3> |
| 65 | +<section class="version" id="5.5.37"><!-- {{{ 5.5.37 --> |
| 66 | +<h3>Version 5.5.37</h3> |
54 | 67 | <b><?php release_date('23-Jun-2016'); ?></b>
|
55 | 68 | <ul><li>Core:
|
56 | 69 | <ul>
|
| 70 | + <li><?php bugfix(72268); ?> (Integer Overflow in nl2br()).</li> |
57 | 71 | <li><?php bugfix(72275); ?> (Integer Overflow in json_encode()/json_decode()/ json_utf8_to_utf16()).</li>
|
58 | 72 | <li><?php bugfix(72400); ?> (Integer Overflow in addcslashes/addslashes).</li>
|
59 | 73 | <li><?php bugfix(72403); ?> (Integer Overflow in Length of String-typed ZVAL).</li>
|
60 | 74 | </ul></li>
|
61 | 75 | <li>GD:
|
62 | 76 | <ul>
|
| 77 | + <li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li> |
63 | 78 | <li><?php bugfix(72298); ?> (pass2_no_dither out-of-bounds access).</li>
|
64 |
| - <li><?php bugfix(72337); ?> (invalid dimensions can lead to crash).</li> |
65 |
| - <li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow).</li> |
| 79 | + <li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow). (CVE-2016-5766)</li> |
66 | 80 | <li><?php bugfix(72407); ?> (NULL Pointer Dereference at _gdScaleVert).</li>
|
67 |
| - <li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow).</li> |
68 |
| -</ul></li> |
69 |
| -<li>Intl: |
70 |
| -<ul> |
71 |
| - <li><?php bugfix(70484); ?> (selectordinal doesn't work with named parameters).</li> |
| 81 | + <li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow). (CVE-2016-5767)</li> |
72 | 82 | </ul></li>
|
73 | 83 | <li>mbstring:
|
74 | 84 | <ul>
|
75 |
| - <li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free).</li> |
| 85 | + <li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free). (CVE-2016-5768)</li> |
76 | 86 | </ul></li>
|
77 |
| -<li>mcrypt: |
78 |
| -<ul> |
79 |
| - <li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows).</li> |
80 | 87 | </ul></li>
|
81 |
| -<li>OpenSSL: |
82 |
| -<ul> |
83 |
| - <li><?php bugfix(72140); ?> (segfault after calling ERR_free_strings()).</li> |
84 |
| -</ul></li> |
85 |
| -<li>Phar: |
| 88 | +<li>mcrypt: |
86 | 89 | <ul>
|
87 |
| - <li><?php bugfix(72321); ?> (invalid free in phar_extract_file()).</li> |
| 90 | + <li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows). (CVE-2016-5769)</li> |
88 | 91 | </ul></li>
|
89 | 92 | <li>SPL:
|
90 | 93 | <ul>
|
91 |
| - <li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread).</li> |
92 |
| - <li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize).</li> |
| 94 | + <li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread). (CVE-2016-5770)</li> |
| 95 | + <li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5771)</li> |
93 | 96 | </ul></li>
|
94 | 97 | <li>WDDX:
|
95 | 98 | <ul>
|
96 |
| - <li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize).</li> |
| 99 | + <li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize). (CVE-2016-5772)</li> |
97 | 100 | </ul></li>
|
98 | 101 | <li>zip:
|
99 | 102 | <ul>
|
100 |
| - <li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize).</li> |
| 103 | + <li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)</li> |
101 | 104 | </ul></li>
|
102 | 105 | </ul>
|
103 | 106 | <!-- }}} --></section>
|
|
0 commit comments