Skip to content

Commit ca55104

Browse files
author
kovacs.ferenc
committed
announce 5.6.25
1 parent 3eba7bb commit ca55104

File tree

6 files changed

+218
-8
lines changed

6 files changed

+218
-8
lines changed

ChangeLog-5.php

Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,132 @@
77
?>
88

99
<h1>PHP 5 ChangeLog</h1>
10+
<section class="version" id="5.6.25"><!-- {{{ 5.6.25 -->
11+
<h3>Version 5.6.25</h3>
12+
<b><?php release_date('18-Aug-2016'); ?></b>
13+
<ul><li>Bz2:
14+
<ul>
15+
<li><?php bugfix(72837); ?> (integer overflow in bzdecompress caused heap corruption).</li>
16+
</ul></li>
17+
<li>Core:
18+
<ul>
19+
<li><?php bugfix(70436); ?> (Use After Free Vulnerability in unserialize()).</li>
20+
<li><?php bugfix(72024); ?> (microtime() leaks memory).</li>
21+
<li><?php bugfix(72581); ?> (previous property undefined in Exception after deserialization).</li>
22+
<li>Implemented FR <?php bugl(72614); ?> (Support "nmake test" on building extensions by phpize).</li>
23+
<li><?php bugfix(72641); ?> (phpize (on Windows) ignores PHP_PREFIX).</li>
24+
<li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization).</li>
25+
<li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability).</li>
26+
</ul></li>
27+
<li>Calendar:
28+
<ul>
29+
<li><?php bugfix(67976); ?> (cal_days_month() fails for final month of the French calendar).</li>
30+
<li><?php bugfix(71894); ?> (AddressSanitizer: global-buffer-overflow in zif_cal_from_jd).</li>
31+
</ul></li>
32+
<li>Curl:
33+
<ul>
34+
<li><?php bugfix(71144); ?> (Segmentation fault when using cURL with ZTS).</li>
35+
<li><?php bugfix(71929); ?> (Certification information (CERTINFO) data parsing error).</li>
36+
<li><?php bugfix(72807); ?> (integer overflow in curl_escape caused heap corruption).</li>
37+
</ul></li>
38+
<li>DOM:
39+
<ul>
40+
<li><?php bugfix(66502); ?> (DOM document dangling reference).</li>
41+
</ul></li>
42+
<li>Ereg:
43+
<ul>
44+
<li><?php bugfix(72838); ?> (Integer overflow lead to heap corruption in sql_regcase).</li>
45+
</ul></li>
46+
<li>EXIF:
47+
<ul>
48+
<li><?php bugfix(72627); ?> (Memory Leakage In exif_process_IFD_in_TIFF).</li>
49+
<li><?php bugfix(72735); ?> (Samsung picture thumb not read (zero size)).</li>
50+
</ul></li>
51+
<li>Filter:
52+
<ul>
53+
<li><?php bugfix(71745); ?> (FILTER_FLAG_NO_RES_RANGE does not cover whole 127.0.0.0/8 range).</li>
54+
</ul></li>
55+
<li>FPM:
56+
<ul>
57+
<li><?php bugfix(72575); ?> (using --allow-to-run-as-root should ignore missing user).</li>
58+
</ul></li>
59+
<li>GD:
60+
<ul>
61+
<li><?php bugfix(43828); ?> (broken transparency of imagearc for truecolor in blendingmode).</li>
62+
<li><?php bugfix(66555); ?> (Always false condition in ext/gd/libgd/gdkanji.c).</li>
63+
<li><?php bugfix(68712); ?> (suspicious if-else statements).</li>
64+
<li><?php bugfix(70315); ?> (500 Server Error but page is fully rendered).</li>
65+
<li><?php bugfix(72596); ?> (imagetypes function won't advertise WEBP support).</li>
66+
<li><?php bugfix(72604); ?> (imagearc() ignores thickness for full arcs).</li>
67+
<li><?php bugfix(72697); ?> (select_colors write out-of-bounds).</li>
68+
<li><?php bugfix(72709); ?> (imagesetstyle() causes OOB read for empty $styles).</li>
69+
<li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write access).</li>
70+
</ul></li>
71+
<li>Intl:
72+
<ul>
73+
<li>Partially fixed <?php bugl(72506); ?> (idn_to_ascii for UTS #46 incorrect for long domain names).</li>
74+
</ul></li>
75+
<li>mbstring:
76+
<ul>
77+
<li><?php bugfix(72691); ?> (mb_ereg_search raises a warning if a match zero-width).</li>
78+
<li><?php bugfix(72693); ?> (mb_ereg_search increments search position when a match zero-width).</li>
79+
<li><?php bugfix(72694); ?> (mb_ereg_search_setpos does not accept a string's last position).</li>
80+
<li><?php bugfix(72710); ?> (`mb_ereg` causes buffer overflow on regexp compile error).</li>
81+
</ul></li>
82+
<li>PCRE:
83+
<ul>
84+
<li><?php bugfix(72688); ?> (preg_match missing group names in matches).</li>
85+
</ul></li>
86+
<li>PDO_pgsql:
87+
<ul>
88+
<li><?php bugfix(70313); ?> (PDO statement fails to throw exception).</li>
89+
</ul></li>
90+
<li>Reflection:
91+
<ul>
92+
<li><?php bugfix(72222); ?> (ReflectionClass::export doesn't handle array constants).</li>
93+
</ul></li>
94+
<li>SNMP:
95+
<ul>
96+
<li><?php bugfix(72708); ?> (php_snmp_parse_oid integer overflow in memory allocation).</li>
97+
</ul></li>
98+
<li>Standard:
99+
<ul>
100+
<li><?php bugfix(72330); ?> (CSV fields incorrectly split if escape char followed by UTF chars).</li>
101+
<li><?php bugfix(72836); ?> (integer overflow in base64_decode).</li>
102+
<li><?php bugfix(72848); ?> (integer overflow in quoted_printable_encode).</li>
103+
<li><?php bugfix(72849); ?> (integer overflow in urlencode).</li>
104+
<li><?php bugfix(72850); ?> (integer overflow in php_uuencode).</li>
105+
<li><?php bugfix(72716); ?> (initialize buffer before read).</li>
106+
</ul></li>
107+
<li>Streams:
108+
<ul>
109+
<li><?php bugfix(41021); ?> (Problems with the ftps wrapper).</li>
110+
<li><?php bugfix(54431); ?> (opendir() does not work with ftps:// wrapper).</li>
111+
<li><?php bugfix(72667); ?> (opendir() with ftp:// attempts to open data stream for non-existent directories).</li>
112+
<li><?php bugfix(72764); ?> (ftps:// opendir wrapper data channel encryption fails with IIS FTP 7.5, 8.5).</li>
113+
<li><?php bugfix(72771); ?> (ftps:// wrapper is vulnerable to protocol downgrade attack).</li>
114+
</ul></li>
115+
<li>SPL:
116+
<ul>
117+
<li><?php bugfix(72122); ?> (IteratorIterator breaks '@' error suppression).</li>
118+
<li><?php bugfix(72646); ?> (SplFileObject::getCsvControl does not return the escape character).</li>
119+
<li><?php bugfix(72684); ?> (AppendIterator segfault with closed generator).</li>
120+
</ul></li>
121+
<li>SQLite3:
122+
<ul>
123+
<li>Implemented FR <?php bugl(72653); ?> (SQLite should allow opening with empty filename).</li>
124+
</ul></li>
125+
<li>Wddx:
126+
<ul>
127+
<li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in wddx_serialize_value()).</li>
128+
<li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access) (Stas)</li>
129+
<li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li>
130+
<li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid xml).</li>
131+
<li><?php bugfix(72799); ?> (wddx_deserialize null dereference in php_wddx_pop_element).</li>
132+
</ul></li>
133+
</ul>
134+
<!-- }}} --></section>
135+
10136
<section class="version" id="5.6.24"><!-- {{{ 5.6.24 -->
11137
<h3>Version 5.6.24</h3>
12138
<b><?php release_date('21-Jul-2016'); ?></b>

archive/archive.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
<uri>http://php.net/contact</uri>
1010
<email>[email protected]</email>
1111
</author>
12+
<xi:include href="entries/2016-08-18-2.xml"/>
1213
<xi:include href="entries/2016-08-18-1.xml"/>
1314
<xi:include href="entries/2016-08-16-2.xml"/>
1415
<xi:include href="entries/2016-08-16-1.xml"/>

archive/entries/2016-08-18-2.xml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom">
3+
<title>PHP 5.6.25 is released</title>
4+
<id>http://php.net/archive/2016.php#id2016-08-18-2</id>
5+
<published>2016-08-18T16:43:25-07:00</published>
6+
<updated>2016-08-18T16:43:25-07:00</updated>
7+
<category term="frontpage" label="PHP.net frontpage news"/>
8+
<category term="releases" label="New PHP release"/>
9+
<link href="http://php.net/index.php#id2016-08-18-2" rel="alternate" type="text/html"/>
10+
<link href="http://php.net/archive/2016.php#id2016-08-18-2" rel="via" type="text/html"/>
11+
<content type="xhtml">
12+
<div xmlns="http://www.w3.org/1999/xhtml">
13+
<p>The PHP development team announces the immediate availability of PHP
14+
7.6.25. This is a security release. Several security bugs were fixed in
15+
this release.
16+
17+
All PHP 5.6 users are encouraged to upgrade to this version.</p>
18+
19+
<p>For source downloads of PHP 5.6.25 please visit our <a href="http://www.php.net/downloads.php">downloads page</a>,
20+
Windows source and binaries can be found on <a href="http://windows.php.net/download/">windows.php.net/download/</a>.
21+
The list of changes is recorded in the <a href="http://www.php.net/ChangeLog-5.php#5.6.25">ChangeLog</a>.
22+
</p>
23+
</div>
24+
</content>
25+
</entry>

include/releases.inc

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,42 @@ $OLDRELEASES = array (
365365
),
366366
5 =>
367367
array (
368+
'5.6.24' =>
369+
array (
370+
'announcement' =>
371+
array (
372+
'English' => '/releases/5_6_24.php',
373+
),
374+
'source' =>
375+
array (
376+
0 =>
377+
array (
378+
'filename' => 'php-5.6.24.tar.bz2',
379+
'name' => 'PHP 5.6.24 (tar.bz2)',
380+
'md5' => '2ab124d58b7b763ca453f6a18ec3866b',
381+
'sha256' => 'bf23617ec3ed0a125ec8bde2b7bca9d3804b2ff4df8de192890c84dc9fac38c6',
382+
'date' => '21 Jul 2016',
383+
),
384+
1 =>
385+
array (
386+
'filename' => 'php-5.6.24.tar.gz',
387+
'name' => 'PHP 5.6.24 (tar.gz)',
388+
'md5' => 'dfa2e90085516cc817a8a9568e2a374e',
389+
'sha256' => '5f8b2e4e00360fee6eb1b89447266ae45993265955bd1ea9866270d75cdb6ec1',
390+
'date' => '21 Jul 2016',
391+
),
392+
2 =>
393+
array (
394+
'filename' => 'php-5.6.24.tar.xz',
395+
'name' => 'PHP 5.6.24 (tar.xz)',
396+
'md5' => '3ef6e3573698b9b444be88edd3b23494',
397+
'sha256' => 'ed7c38c6dac539ade62e08118258f4dac0c49beca04d8603bee4e0ea6ca8250b',
398+
'date' => '21 Jul 2016',
399+
),
400+
),
401+
'date' => '21 Jul 2016',
402+
'museum' => false,
403+
),
368404
'5.6.23' =>
369405
array (
370406
'announcement' =>

include/version.inc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,17 +38,17 @@ $PHP_7_0_SHA256 = array(
3838
$PHP_5_6_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
3939
$PHP_5_6_RC_DATE = '07 Jul 2016';
4040

41-
$PHP_5_6_VERSION = "5.6.24";
42-
$PHP_5_6_DATE = "21 Jul 2016";
41+
$PHP_5_6_VERSION = "5.6.25";
42+
$PHP_5_6_DATE = "18 Aug 2016";
4343
$PHP_5_6_MD5 = array(
44-
"tar.bz2" => "2ab124d58b7b763ca453f6a18ec3866b",
45-
"tar.gz" => "dfa2e90085516cc817a8a9568e2a374e",
46-
"tar.xz" => "3ef6e3573698b9b444be88edd3b23494",
44+
"tar.bz2" => "f63b9956c25f1ae0433015a80b44224c",
45+
"tar.gz" => "75f90f5bd7d0076a0dcc5f3205ce260e",
46+
"tar.xz" => "81cb8c0de0d0b714587edbd27a2a75bb",
4747
);
4848
$PHP_5_6_SHA256 = array(
49-
"tar.bz2" => "bf23617ec3ed0a125ec8bde2b7bca9d3804b2ff4df8de192890c84dc9fac38c6",
50-
"tar.gz" => "5f8b2e4e00360fee6eb1b89447266ae45993265955bd1ea9866270d75cdb6ec1",
51-
"tar.xz" => "ed7c38c6dac539ade62e08118258f4dac0c49beca04d8603bee4e0ea6ca8250b",
49+
"tar.bz2" => "58ce6032aced7f3e42ced492bd9820e5b3f2a3cd3ef71429aa92fd7b3eb18dde",
50+
"tar.gz" => "733f1c811d51c2d4031a0c058dc94d09d03858d781ca2eb2cce78853bc76db58",
51+
"tar.xz" => "7535cd6e20040ccec4594cc386c6f15c3f2c88f24163294a31068cf7dfe7f644",
5252
);
5353
/* PHP 5.5 Release */
5454
$PHP_5_5_RC = false; // Current RC version (e.g., '5.6.7RC1') or false

releases/5_6_25.php

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
<?php
2+
// $Id$
3+
$_SERVER['BASE_PAGE'] = 'releases/5_6_25.php';
4+
include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
5+
site_header("PHP 5.6.25 Release Announcement");
6+
?>
7+
8+
<h1>PHP 5.6.25 Release Announcement</h1>
9+
10+
<p>The PHP development team announces the immediate availability of PHP
11+
5.6.25. This is a security release. Several security bugs were fixed in
12+
this release.
13+
14+
All PHP 5.6 users are encouraged to upgrade to this version.
15+
</p>
16+
17+
<p>For source downloads of PHP 5.6.25 please visit our <a href="http://www.php.net/downloads.php">downloads page</a>,
18+
Windows source and binaries can be found on <a href="http://windows.php.net/download/">windows.php.net/download/</a>.
19+
The list of changes is recorded in the <a href="http://www.php.net/ChangeLog-5.php#5.6.25">ChangeLog</a>.
20+
</p>
21+
22+
<?php site_footer(); ?>

0 commit comments

Comments
 (0)