Commit: 985c343bb008a8f753cc3b623eda53491131e8e6
Author: Anatol Belski <[email protected]> Fri, 29 Apr 2016 01:18:32 +0200
Parents: 79524c69996238de8accb5f1e9ad3d131ee1a81b
Branches: master
Link:
http://git.php.net/?p=web/php.git;a=commitdiff;h=985c343bb008a8f753cc3b623eda53491131e8e6
Log:
7.0.6 announce
Changed paths:
M ChangeLog-7.php
M archive/archive.xml
A archive/entries/2016-04-29-1.xml
M include/releases.inc
M include/version.inc
A releases/7_0_6.php
diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 88302c4..29252d7 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -7,6 +7,121 @@ site_header("PHP 7 ChangeLog", array("current" => "docs",
"css" => array("change
<h1>PHP 7 ChangeLog</h1>
+<section class="version" id="7.0.6"><!-- {{{ 7.0.6 -->
+<h3>Version 7.0.6</h3>
+<b><?php release_date('28-Apr-2016'); ?></b>
+<ul><li>Core:
+<ul>
+ <li><?php bugfix(71930); ?> (_zval_dtor_func: Assertion
`(arr)->gc.refcount <= 1' failed).</li>
+ <li><?php bugfix(71922); ?> (Crash on assert(new class{})).</li>
+ <li><?php bugfix(71914); ?> (Reference is lost in "switch").</li>
+ <li><?php bugfix(71871); ?> (Interfaces allow final and abstract
functions).</li>
+ <li><?php bugfix(71859); ?> (zend_objects_store_call_destructors operates on
realloced memory, crashing).</li>
+ <li><?php bugfix(71841); ?> (EG(error_zval) is not handled well).</li>
+ <li><?php bugfix(71750); ?> (Multiple Heap Overflows in php_raw_url_encode/
php_url_encode).</li>
+ <li><?php bugfix(71731); ?> (Null coalescing operator and ArrayAccess).</li>
+ <li><?php bugfix(71609); ?> (Segmentation fault on ZTS with
gethostbyname).</li>
+ <li><?php bugfix(71428); ?> (inheritance and allow_null).</li>
+ <li><?php bugfix(71414); ?> (Inheritance, traits and interfaces).</li>
+ <li><?php bugfix(71359); ?> (Null coalescing operator and magic).</li>
+ <li><?php bugfix(71334); ?> (Cannot access array keys while uksort()).</li>
+ <li><?php bugfix(69659); ?> (ArrayAccess, isset() and the offsetExists
method).</li>
+ <li><?php bugfix(69537); ?> (__debugInfo with empty string for key gives
error).</li>
+ <li><?php bugfix(62059); ?> (ArrayObject and isset are not friends).</li>
+ <li><?php bugfix(71980); ?> (Decorated/Nested Generator is Uncloseable in
Finally).</li>
+</ul></li>
+<li>BCmath:
+<ul>
+ <li><?php bugfix(72093); ?> (bcpowmod accepts negative scale and corrupts
_one_ definition).</li>
+</ul></li>
+<li>Curl:
+<ul>
+ <li><?php bugfix(71831); ?> (CURLOPT_NOPROXY applied as long instead of
string).</li>
+</ul></li>
+<li>Date:
+<ul>
+ <li><?php bugfix(71889); ?> (DateInterval::format Segmentation fault).</li>
+</ul></li>
+<li>EXIF:
+<ul>
+ <li><?php bugfix(72094); ?> (Out of bounds heap read access in exif header
processing).</li>
+</ul></li>
+<li>GD:
+<ul>
+ <li><?php bugfix(71912); ?> (libgd: signedness vulnerability).
(CVE-2016-3074)</li>
+</ul></li>
+<li>Intl:
+<ul>
+ <li><?php bugfix(71516); ?> (IntlDateFormatter looses locale if pattern is
set via constructor).</li>
+ <li><?php bugfix(70455); ?> (Missing constant:
IntlChar::NO_NUMERIC_VALUE).</li>
+ <li><?php bugfix(70451); ?>, #70452 (Inconsistencies in return values of
IntlChar methods).</li>
+ <li><?php bugfix(68893); ?> (Stackoverflow in datefmt_create).</li>
+ <li><?php bugfix(66289); ?> (Locale::lookup incorrectly returns en or en_US
if locale is empty).</li>
+ <li><?php bugfix(70484); ?> (selectordinal doesn't work with named
parameters).</li>
+ <li><?php bugfix(72061); ?> (Out-of-bounds reads in zif_grapheme_stripos
with negative offset).</li>
+</ul></li>
+<li>ODBC:
+<ul>
+ <li><?php bugfix(63171); ?> (Script hangs after max_execution_time).</li>
+</ul></li>
+<li>Opcache:
+<ul>
+ <li><?php bugfix(71843); ?> (null ptr deref
ZEND_RETURN_SPEC_CONST_HANDLER).</li>
+</ul></li>
+<li>PDO:
+<ul>
+ <li><?php bugfix(52098); ?> (Own PDOStatement implementation ignore
__call()).</li>
+ <li><?php bugfix(71447); ?> (Quotes inside comments not properly
handled).</li>
+</ul></li>
+<li>PDO_DBlib:
+<ul>
+ <li><?php bugfix(71943); ?> (dblib_handle_quoter needs to allocate an extra
byte).</li>
+ <li>Add DBLIB-specific attributes for controlling timeouts.</li>
+</ul></li>
+<li>PDO_pgsql:
+<ul>
+ <li><?php bugfix(62498); ?> (pdo_pgsql inefficient when getColumnMeta() is
used).</li>
+</ul></li>
+<li>Postgres:
+<ul>
+ <li><?php bugfix(71820); ?> (pg_fetch_object binds parameters before call
constructor).</li>
+ <li><?php bugfix(71998); ?> (Function pg_insert does not insert when column
type = inet).</li>
+</ul></li>
+<li>SOAP:
+<ul>
+ <li><?php bugfix(71986); ?> (Nested foreach assign-by-reference creates
broken variables).</li>
+</ul></li>
+<li>SPL:
+<ul>
+ <li><?php bugfix(71838); ?> (Deserializing serialized
SPLObjectStorage-Object can't access properties in PHP).</li>
+ <li><?php bugfix(71735); ?> (Double-free in
SplDoublyLinkedList::offsetSet).</li>
+ <li><?php bugfix(67582); ?> (Cloned SplObjectStorage with overwritten
getHash fails offsetExists()).</li>
+ <li><?php bugfix(52339); ?> (SPL autoloader breaks class_exists()).</li>
+</ul></li>
+<li>Standard:
+<ul>
+ <li><?php bugfix(72116); ?> (array_fill optimization breaks
implementation).</li>
+ <li><?php bugfix(71995); ?> (Returning the same var twice from __sleep()
produces broken serialized data).</li>
+ <li><?php bugfix(71940); ?> (Unserialize crushes on restore object
reference).</li>
+ <li><?php bugfix(71969); ?> (str_replace returns an incorrect resulting
array after a foreach by reference).</li>
+ <li><?php bugfix(71891); ?> (header_register_callback() and
register_shutdown_function()).</li>
+ <li><?php bugfix(71884); ?> (Null pointer deref (segfault) in
stream_context_get_default).</li>
+ <li><?php bugfix(71840); ?> (Unserialize accepts wrongly data).</li>
+ <li><?php bugfix(71837); ?> (Wrong arrays behaviour).</li>
+ <li><?php bugfix(71827); ?> (substr_replace bug, string length).</li>
+ <li><?php bugfix(67512); ?> (php_crypt() crashes if crypt_r() does not exist
or _REENTRANT is not defined).</li>
+</ul></li>
+<li>XML:
+<ul>
+ <li><?php bugfix(72099); ?> (xml_parse_into_struct segmentation fault).</li>
+</ul></li>
+<li>Zip:
+<ul>
+ <li><?php bugfix(71923); ?> (integer overflow in ZipArchive::getFrom*).
(CVE-2016-3078)</li>
+</ul></li>
+</ul>
+<!-- }}} --></section>
+
<section class="version" id="7.0.5"><!-- {{{ 7.0.5 -->
<h3>Version 7.0.5</h3>
<b><?php release_date('31-Mar-2016'); ?></b>
diff --git a/archive/archive.xml b/archive/archive.xml
index aa44c79..cdae727 100644
--- a/archive/archive.xml
+++ b/archive/archive.xml
@@ -9,6 +9,7 @@
<uri>http://php.net/contact</uri>
<email>[email protected]</email>
</author>
+ <xi:include href="entries/2016-04-29-1.xml"/>
<xi:include href="entries/2016-04-28-2.xml"/>
<xi:include href="entries/2016-04-28-1.xml"/>
<xi:include href="entries/2016-04-18-1.xml"/>
diff --git a/archive/entries/2016-04-29-1.xml b/archive/entries/2016-04-29-1.xml
new file mode 100644
index 0000000..60ed4aa
--- /dev/null
+++ b/archive/entries/2016-04-29-1.xml
@@ -0,0 +1,31 @@
+<?xml version="1.0" encoding="utf-8"?>
+<entry xmlns="http://www.w3.org/2005/Atom">
+ <title>PHP 7.0.6 Released</title>
+ <id>http://php.net/archive/2016.php#id2016-04-29-1</id>
+ <published>2016-04-29T02:30:00+01:00</published>
+ <updated>2016-04-29T02:30:00+01:00</updated>
+ <category term="releases" label="New PHP release"/>
+ <category term="frontpage" label="PHP.net frontpage news"/>
+ <link href="http://php.net/index.php#id2016-04-29-1" rel="alternate"
type="text/html"/>
+ <link href="http://php.net/archive/2016.php#id2016-04-29-1" rel="via"
type="text/html"/>
+ <content type="xhtml">
+ <div xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.0.6. This is a security release. Several security bugs were fixed in
+ this release, including
+ </p>
+ <ul>
+ <li>CVE-2016-3078</li>
+ <li>CVE-2016-3074</li>
+ </ul>
+ <p>
+ All PHP 7.0 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>For source downloads of PHP 7.0.6 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-7.php#7.0.6">ChangeLog</a>.
+ </p>
+ </div>
+ </content>
+</entry>
diff --git a/include/releases.inc b/include/releases.inc
index fc86f83..0c1da62 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,42 @@
$OLDRELEASES = array (
7 =>
array (
+ '7.0.5' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/7_0_5.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-7.0.5.tar.bz2',
+ 'name' => 'PHP 7.0.5 (tar.bz2)',
+ 'md5' => 'b15e6836babcbf0aa446678ee38f896b',
+ 'sha256' =>
'2c09af7fe64537ea795f098b9b542ead407ef83f7cdc65b3787115ccbbb51de9',
+ 'date' => '31 Mar 2016',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-7.0.5.tar.gz',
+ 'name' => 'PHP 7.0.5 (tar.gz)',
+ 'md5' => 'c8379f3875caf95ce14266ca8212eb4e',
+ 'sha256' =>
'f9d93419031b4df663fc48f03b8a833545de8776225e46637563e2be6029908d',
+ 'date' => '31 Mar 2016',
+ ),
+ 2 =>
+ array (
+ 'filename' => 'php-7.0.5.tar.xz',
+ 'name' => 'PHP 7.0.5 (tar.xz)',
+ 'md5' => 'dcaaf14356875b80f937cc6700c58acb',
+ 'sha256' =>
'c41f1a03c24119c0dd9b741cdb67880486e64349fc33527767f6dc28d3803abb',
+ 'date' => '31 Mar 2016',
+ ),
+ ),
+ 'date' => '31 Mar 2016',
+ 'museum' => false,
+ ),
'7.0.4' =>
array (
'announcement' =>
diff --git a/include/version.inc b/include/version.inc
index ebf3c17..faad506 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -19,20 +19,20 @@
*/
/* PHP 7.0 Release */
-$PHP_7_0_RC = "7.0.6RC1"; // Current RC version (e.g., '5.6.7RC1') or false
+$PHP_7_0_RC = false; // Current RC version (e.g., '5.6.7RC1') or false
$PHP_7_0_RC_DATE = '14 Apr 2016';
-$PHP_7_0_VERSION = "7.0.5";
-$PHP_7_0_DATE = "31 Mar 2016";
+$PHP_7_0_VERSION = "7.0.6";
+$PHP_7_0_DATE = "28 Apr 2016";
$PHP_7_0_MD5 = array(
- "tar.bz2" => "b15e6836babcbf0aa446678ee38f896b",
- "tar.gz" => "c8379f3875caf95ce14266ca8212eb4e",
- "tar.xz" => "dcaaf14356875b80f937cc6700c58acb",
+ "tar.bz2" => "c89a1046ff06f6aff699057376e297b6",
+ "tar.gz" => "c9e2ff2d6f843a584179ce96e63e38f9",
+ "tar.xz" => "5f0c5d999a6b5c700b31fd9618d5651d",
);
$PHP_7_0_SHA256 = array(
- "tar.bz2" =>
"2c09af7fe64537ea795f098b9b542ead407ef83f7cdc65b3787115ccbbb51de9",
- "tar.gz" =>
"f9d93419031b4df663fc48f03b8a833545de8776225e46637563e2be6029908d",
- "tar.xz" =>
"c41f1a03c24119c0dd9b741cdb67880486e64349fc33527767f6dc28d3803abb",
+ "tar.bz2" =>
"14ddf192a9965c858c1e742a61456be2f34a4db87556172c0d76f08de96329b7",
+ "tar.gz" =>
"f6b47cb3e02530d96787ae5c7888aefbd1db6ae4164d68b88808ee6f4da94277",
+ "tar.xz" =>
"1b237a9455e5476a425dbb9d99966bad68107747c601958cb9558a7fb49ab419",
);
/* PHP 5.6 Release */
diff --git a/releases/7_0_6.php b/releases/7_0_6.php
new file mode 100644
index 0000000..f9eb27f
--- /dev/null
+++ b/releases/7_0_6.php
@@ -0,0 +1,26 @@
+<?php
+// $Id$
+$_SERVER['BASE_PAGE'] = 'releases/7_0_6.php';
+include_once $_SERVER['DOCUMENT_ROOT'] . '/include/prepend.inc';
+site_header("PHP 7.0.6 Release Announcement");
+?>
+
+ <h1>PHP 7.0.6 Release Announcement</h1>
+
+ <p>The PHP development team announces the immediate availability of PHP
+ 7.0.6. This is a security release. Several security bugs were fixed in
+ this release, including</p>
+ <ul>
+ <li>CVE-2016-3078</li>
+ <li>CVE-2016-3074</li>
+ </ul>
+ <p>
+ All PHP 7.0 users are encouraged to upgrade to this version.
+ </p>
+
+ <p>For source downloads of PHP 7.0.6 please visit our <a
href="http://www.php.net/downloads.php">downloads page</a>,
+ Windows source and binaries can be found on <a
href="http://windows.php.net/download/">windows.php.net/download/</a>.
+ The list of changes is recorded in the <a
href="http://www.php.net/ChangeLog-7.php#7.0.6">ChangeLog</a>.
+ </p>
+
+<?php site_footer(); ?>--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php