Skip to content

Commit b62019c

Browse files
committed
7.0.9 announce
1 parent d4cc47c commit b62019c

File tree

6 files changed

+189
-9
lines changed

6 files changed

+189
-9
lines changed

ChangeLog-7.php

Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,102 @@
77

88
<h1>PHP 7 ChangeLog</h1>
99

10+
<section class="version" id="7.0.9"><!-- {{{ 7.0.9 -->
11+
<h3>Version 7.0.9</h3>
12+
<b><?php release_date('21-Jul-2016'); ?></b>
13+
<ul><li>Core:
14+
<ul>
15+
<li><?php bugfix(72508); ?> (strange references after recursive function call and "switch" statement).</li>
16+
<li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex).</li>
17+
<li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications).</li>
18+
</ul></li>
19+
<li>bz2:
20+
<ul>
21+
<li><?php bugfix(72613); ?> (Inadequate error handling in bzread()).</li>
22+
</ul></li>
23+
<li>CLI:
24+
<ul>
25+
<li><?php bugfix(72484); ?> (SCRIPT_FILENAME shows wrong path if the user specify router.php).</li>
26+
</ul></li>
27+
<li>COM:
28+
<ul>
29+
<li><?php bugfix(72498); ?> (variant_date_from_timestamp null dereference).</li>
30+
</ul></li>
31+
<li>Curl:
32+
<ul>
33+
<li><?php bugfix(72541); ?> (size_t overflow lead to heap corruption).</li>
34+
</ul></li>
35+
<li>Exif:
36+
<ul>
37+
<li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE).</li>
38+
<li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment).</li>
39+
</ul></li>
40+
<li>GD:
41+
<ul>
42+
<li><?php bugfix(43475); ?> (Thick styled lines have scrambled patterns).</li>
43+
<li><?php bugfix(53640); ?> (XBM images require width to be multiple of 8).</li>
44+
<li><?php bugfix(64641); ?> (imagefilledpolygon doesn't draw horizontal line).</li>
45+
<li><?php bugfix(72512); ?> (gdImageTrueColorToPaletteBody allows arbitrary write/read access).</li>
46+
<li><?php bugfix(72519); ?> (imagegif/output out-of-bounds access).</li>
47+
<li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()).</li>
48+
<li><?php bugfix(72482); ?> (Ilegal write/read access caused by gdImageAALine overflow).</li>
49+
<li><?php bugfix(72494); ?> (imagecropauto out-of-bounds access).</li>
50+
</ul></li>
51+
<li>Intl:
52+
<ul>
53+
<li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access).</li>
54+
</ul></li>
55+
<li>Mbstring:
56+
<ul>
57+
<li><?php bugfix(72405); ?> (mb_ereg_replace - mbc_to_code (oniguruma) - oob read access).</li>
58+
<li><?php bugfix(72399); ?> (Use-After-Free in MBString (search_re)).</li>
59+
</ul></li>
60+
<li>mcrypt:
61+
<ul>
62+
<li><?php bugfix(72551); ?>, bug <?php bugl(72552) ?> (Incorrect casting from size_t to int lead to heap overflow in mdecrypt_generic).</li>
63+
</ul></li>
64+
<li>PDO_pgsql:
65+
<ul>
66+
<li><?php bugfix(72570); ?> (Segmentation fault when binding parameters on a query without placeholders).</li>
67+
</ul></li>
68+
<li>PCRE:
69+
<ul>
70+
<li><?php bugfix(72476); ?> (Memleak in jit_stack).</li>
71+
<li><?php bugfix(72463); ?> (mail fails with invalid argument).</li>
72+
</ul></li>
73+
<li>Readline:
74+
<ul>
75+
<li><?php bugfix(72538); ?> (readline_redisplay crashes php).</li>
76+
</ul></li>
77+
<li>Standard:
78+
<ul>
79+
<li><?php bugfix(72505); ?> (readfile() mangles files larger than 2G).</li>
80+
<li><?php bugfix(72306); ?> (Heap overflow through proc_open and $env parameter).</li>
81+
</ul></li>
82+
<li>Session:
83+
<ul>
84+
<li><?php bugfix(72531); ?> (ps_files_cleanup_dir Buffer overflow).</li>
85+
<li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected Session Deserialization).</li>
86+
</ul></li>
87+
<li>SNMP:
88+
<ul>
89+
<li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()).</li>
90+
</ul></li>
91+
<li>Streams:
92+
<ul>
93+
<li><?php bugfix(72439); ?> (Stream socket with remote address leads to a segmentation fault).</li>
94+
</ul></li>
95+
<li>XMLRPC:
96+
<ul>
97+
<li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c).</li>
98+
</ul></li>
99+
<li>Zip:
100+
<ul>
101+
<li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener).</li>
102+
</ul></li>
103+
</ul>
104+
<!-- }}} --></section>
105+
10106
<section class="version" id="7.0.8"><!-- {{{ 7.0.8 -->
11107
<h3>Version 7.0.8</h3>
12108
<b><?php release_date('23-Jun-2016'); ?></b>

archive/archive.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
<uri>http://php.net/contact</uri>
1010
<email>[email protected]</email>
1111
</author>
12+
<xi:include href="entries/2016-07-21-3.xml"/>
1213
<xi:include href="entries/2016-07-21-1.xml"/>
1314
<xi:include href="entries/2016-07-07-1.xml"/>
1415
<xi:include href="entries/2016-06-24-1.xml"/>

archive/entries/2016-07-21-3.xml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom">
3+
<title>PHP 7.0.9 Released</title>
4+
<id>http://php.net/archive/2016.php#id2016-07-21-3</id>
5+
<published>2016-07-21T13:00:00+01:00</published>
6+
<updated>2016-07-21T13:00:00+01:00</updated>
7+
<category term="releases" label="New PHP release"/>
8+
<category term="frontpage" label="PHP.net frontpage news"/>
9+
<link href="http://php.net/index.php#id2016-07-21-3" rel="alternate" type="text/html"/>
10+
<link href="http://php.net/archive/2016.php#id2016-07-21-3" rel="via" type="text/html"/>
11+
<content type="xhtml">
12+
<div xmlns="http://www.w3.org/1999/xhtml">
13+
<p>The PHP development team announces the immediate availability of PHP
14+
7.0.9. This is a security release. Several security bugs were fixed in
15+
this release, including the HTTP_PROXY issue.
16+
17+
All PHP 7.0 users are encouraged to upgrade to this version.</p>
18+
19+
<p>For source downloads of PHP 7.0.9 please visit our <a href="http://www.php.net/downloads.php">downloads page</a>,
20+
Windows source and binaries can be found on <a href="http://windows.php.net/download/">windows.php.net/download/</a>.
21+
The list of changes is recorded in the <a href="http://www.php.net/ChangeLog-7.php#7.0.9">ChangeLog</a>.
22+
</p>
23+
</div>
24+
</content>
25+
</entry>

include/releases.inc

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,42 @@
22
$OLDRELEASES = array (
33
7 =>
44
array (
5+
'7.0.8' =>
6+
array (
7+
'announcement' =>
8+
array (
9+
'English' => '/releases/7_0_8.php',
10+
),
11+
'source' =>
12+
array (
13+
0 =>
14+
array (
15+
'filename' => 'php-7.0.8.tar.bz2',
16+
'name' => 'PHP 7.0.8 (tar.bz2)',
17+
'md5' => 'd4f67b081a3c1b0b35f729ef8131cdda',
18+
'sha256' => '66dc7ba388490e07b1313fe3a06b1fa822e1310585fe29f4909995f131e27c8d',
19+
'date' => '23 Jun 2016',
20+
),
21+
1 =>
22+
array (
23+
'filename' => 'php-7.0.8.tar.gz',
24+
'name' => 'PHP 7.0.8 (tar.gz)',
25+
'md5' => '642d86f3269404abc1bbfd887b682ccf',
26+
'sha256' => '1f024fa6d87594b99fa312e3185c357dcffa42e07d21c726f41d1fa6f773720b',
27+
'date' => '23 Jun 2016',
28+
),
29+
2 =>
30+
array (
31+
'filename' => 'php-7.0.8.tar.xz',
32+
'name' => 'PHP 7.0.8 (tar.xz)',
33+
'md5' => 'c4438583c95d3ddf746929d7fcb61045',
34+
'sha256' => '0a2142c458b0846f556b16da1c927d74c101aa951bb840549abe5c58584fb394',
35+
'date' => '23 Jun 2016',
36+
),
37+
),
38+
'date' => '23 Jun 2016',
39+
'museum' => false,
40+
),
541
'7.0.7' =>
642
array (
743
'announcement' =>

include/version.inc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,20 +18,20 @@
1818
*/
1919

2020
/* PHP 7.0 Release */
21-
$PHP_7_0_RC = "7.0.9RC1"; // Current RC version (e.g., '5.6.7RC1') or false
21+
$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
2222
$PHP_7_0_RC_DATE = '07 Jul 2016';
2323

24-
$PHP_7_0_VERSION = "7.0.8";
25-
$PHP_7_0_DATE = "23 Jun 2016";
24+
$PHP_7_0_VERSION = "7.0.9";
25+
$PHP_7_0_DATE = "21 Jul 2016";
2626
$PHP_7_0_MD5 = array(
27-
"tar.bz2" => "d4f67b081a3c1b0b35f729ef8131cdda",
28-
"tar.gz" => "642d86f3269404abc1bbfd887b682ccf",
29-
"tar.xz" => "c4438583c95d3ddf746929d7fcb61045",
27+
"tar.bz2" => "63b32d3e97df7b30c2bcd138ef0b21c0",
28+
"tar.gz" => "32ea3ce54d7d5ed03c6c600dffd65813",
29+
"tar.xz" => "6294813fb3c8158cfde74302f573cac7",
3030
);
3131
$PHP_7_0_SHA256 = array(
32-
"tar.bz2" => "66dc7ba388490e07b1313fe3a06b1fa822e1310585fe29f4909995f131e27c8d",
33-
"tar.gz" => "1f024fa6d87594b99fa312e3185c357dcffa42e07d21c726f41d1fa6f773720b",
34-
"tar.xz" => "0a2142c458b0846f556b16da1c927d74c101aa951bb840549abe5c58584fb394",
32+
"tar.bz2" => "2ee6968b5875f2f38700c58a189aad859a6a0b85fc337aa102ec2dc3652c3b7b",
33+
"tar.gz" => "93895a6a610c94751c890e5ee91a7f4bc0eae476b95fe30425d13f7ae88753d5",
34+
"tar.xz" => "970c322ba3e472cb0264b8ba9d4d92e87918da5d0cca53c4aba2a70545b8626d",
3535
);
3636

3737
/* PHP 5.6 Release */

releases/7_0_9.php

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
<?php
2+
// $Id$
3+
$_SERVER['BASE_PAGE'] = 'releases/7_0_9.php';
4+
include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
5+
site_header("PHP 7.0.9 Release Announcement");
6+
?>
7+
8+
<h1>PHP 7.0.9 Release Announcement</h1>
9+
10+
<p>The PHP development team announces the immediate availability of PHP
11+
7.0.9. This is a security release. Several security bugs were fixed in
12+
this release, including the HTTP_PROXY issue.
13+
14+
All PHP 7.0 users are encouraged to upgrade to this version.
15+
</p>
16+
17+
<p>For source downloads of PHP 7.0.9 please visit our <a href="http://www.php.net/downloads.php">downloads page</a>,
18+
Windows source and binaries can be found on <a href="http://windows.php.net/download/">windows.php.net/download/</a>.
19+
The list of changes is recorded in the <a href="http://www.php.net/ChangeLog-7.php#7.0.9">ChangeLog</a>.
20+
</p>
21+
22+
<?php site_footer(); ?>

0 commit comments

Comments
 (0)