|
7 | 7 | ?>
|
8 | 8 |
|
9 | 9 | <h1>PHP 5 ChangeLog</h1>
|
| 10 | +<section class="version" id="5.6.26"><!-- {{{ 5.6.26 --> |
| 11 | +<h3>Version 5.6.26</h3> |
| 12 | +<b><?php release_date('15-Sep-2016'); ?></b> |
| 13 | +<ul><li>Core: |
| 14 | +<ul> |
| 15 | + <li><?php bugfix(72907); ?> (null pointer deref, segfault in gc_remove_zval_from_buffer (zend_gc.c:260)).</li> |
| 16 | +</ul></li> |
| 17 | +<li>Dba: |
| 18 | +<ul> |
| 19 | + <li><?php bugfix(71514); ?> (Bad dba_replace condition because of wrong API usage).</li> |
| 20 | + <li><?php bugfix(70825); ?> (Cannot fetch multiple values with group in ini file).</li> |
| 21 | +</ul></li> |
| 22 | +<li>EXIF: |
| 23 | +<ul> |
| 24 | + <li><?php bugfix(72926); ?> (Uninitialized Thumbail Data Leads To Memory Leakage in exif_process_IFD_in_TIFF).</li> |
| 25 | +</ul></li> |
| 26 | +<li>FTP: |
| 27 | +<ul> |
| 28 | + <li><?php bugfix(70195); ?> (Cannot upload file using ftp_put to FTPES with require_ssl_reuse).</li> |
| 29 | +</ul></li> |
| 30 | +<li>GD: |
| 31 | +<ul> |
| 32 | + <li><?php bugfix(66005); ?> (imagecopy does not support 1bit transparency on truecolor images).</li> |
| 33 | + <li><?php bugfix(72913); ?> (imagecopy() loses single-color transparency on palette images).</li> |
| 34 | + <li><?php bugfix(68716); ?> (possible resource leaks in _php_image_convert()).</li> |
| 35 | +</ul></li> |
| 36 | +<li>Intl: |
| 37 | +<ul> |
| 38 | + <li><?php bugfix(73007); ?> (add locale length check). (CVE-2016-7416)</li> |
| 39 | +</ul></li> |
| 40 | +<li>JSON: |
| 41 | +<ul> |
| 42 | + <li><?php bugfix(72787); ?> (json_decode reads out of bounds).</li> |
| 43 | +</ul></li> |
| 44 | +<li>mbstring: |
| 45 | +<ul> |
| 46 | + <li><?php bugfix(66797); ?> (mb_substr only takes 32-bit signed integer).</li> |
| 47 | + <li><?php bugfix(72910); ?> (Out of bounds heap read in mbc_to_code() / triggered by mb_ereg_match()).</li> |
| 48 | +</ul></li> |
| 49 | +<li>MSSQL: |
| 50 | +<ul> |
| 51 | + <li><?php bugfix(72039); ?> (Use of uninitialised value on mssql_guid_string).</li> |
| 52 | +</ul></li> |
| 53 | +<li>Mysqlnd: |
| 54 | +<ul> |
| 55 | + <li><?php bugfix(72293); ?> (Heap overflow in mysqlnd related to BIT fields). (CVE-2016-7412)</li> |
| 56 | +</ul></li> |
| 57 | +<li>PDO: |
| 58 | +<ul> |
| 59 | + <li><?php bugfix(60665); ?> (call to empty() on NULL result using PDO::FETCH_LAZY returns false).</li> |
| 60 | +</ul></li> |
| 61 | +<li>PDO_pgsql: |
| 62 | +<ul> |
| 63 | + <li>Implemented FR <?php bugl(72633); ?> (Postgres PDO lastInsertId() should work without specifying a sequence).</li> |
| 64 | + <li><?php bugfix(72759); ?> (Regression in pgo_pgsql).</li> |
| 65 | +</ul></li> |
| 66 | +<li>Phar: |
| 67 | +<ul> |
| 68 | + <li><?php bugfix(72928); ?> (Out of bound when verify signature of zip phar in phar_parse_zipfile). (CVE-2016-7414)</li> |
| 69 | + <li><?php bugfix(73035); ?> (Out of bound when verify signature of tar phar in phar_parse_tarfile).</li> |
| 70 | +</ul></li> |
| 71 | +<li>SPL: |
| 72 | +<ul> |
| 73 | + <li><?php bugfix(73029); ?> (Missing type check when unserializing SplArray). (CVE-2016-7417)</li> |
| 74 | +</ul></li> |
| 75 | +<li>Standard: |
| 76 | +<ul> |
| 77 | + <li><?php bugfix(72823); ?> (strtr out-of-bound access).</li> |
| 78 | + <li><?php bugfix(72278); ?> (getimagesize returning FALSE on valid jpg).</li> |
| 79 | + <li><?php bugfix(65550); ?> (get_browser() incorrectly parses entries with "+" sign).</li> |
| 80 | + <li><?php bugfix(71882); ?> (Negative ftruncate() on php://memory exhausts memory).</li> |
| 81 | + <li><?php bugfix(73011); ?> (integer overflow in fgets cause heap corruption).</li> |
| 82 | + <li><?php bugfix(73017); ?> (memory corruption in wordwrap function).</li> |
| 83 | + <li><?php bugfix(73045); ?> (integer overflow in fgetcsv caused heap corruption).</li> |
| 84 | + <li><?php bugfix(73052); ?> (Memory Corruption in During Deserialized-object Destruction). (CVE-2016-7411)</li> |
| 85 | +</ul></li> |
| 86 | +<li>Streams: |
| 87 | +<ul> |
| 88 | + <li><?php bugfix(72853); ?> (stream_set_blocking doesn't work).</li> |
| 89 | +</ul></li> |
| 90 | +<li>Wddx: |
| 91 | +<ul> |
| 92 | + <li><?php bugfix(72860); ?> (wddx_deserialize use-after-free). (CVE-2016-7413)</li> |
| 93 | + <li><?php bugfix(73065); ?> (Out-Of-Bounds Read in php_wddx_push_element). (CVE-2016-7418)</li> |
| 94 | +</ul></li> |
| 95 | +<li>XML: |
| 96 | +<ul> |
| 97 | + <li><?php bugfix(72085); ?> (SEGV on unknown address zif_xml_parse).</li> |
| 98 | + <li><?php bugfix(72927); ?> (integer overflow in xml_utf8_encode).</li> |
| 99 | +</ul></li> |
| 100 | +<li>ZIP: |
| 101 | +<ul> |
| 102 | + <li><?php bugfix(68302); ?> (impossible to compile php with zip support).</li> |
| 103 | +</ul></li> |
| 104 | +</ul> |
| 105 | +<!-- }}} --></section> |
| 106 | + |
10 | 107 | <section class="version" id="5.6.25"><!-- {{{ 5.6.25 -->
|
11 | 108 | <h3>Version 5.6.25</h3>
|
12 | 109 | <b><?php release_date('18-Aug-2016'); ?></b>
|
|
17 | 114 | <li><?php bugfix(72581); ?> (previous property undefined in Exception after deserialization).</li>
|
18 | 115 | <li>Implemented FR <?php bugl(72614); ?> (Support "nmake test" on building extensions by phpize).</li>
|
19 | 116 | <li><?php bugfix(72641); ?> (phpize (on Windows) ignores PHP_PREFIX).</li>
|
20 |
| - <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization).</li> |
21 |
| - <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability).</li> |
| 117 | + <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization). (CVE-2016-7124)</li> |
| 118 | + <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability). (CVE-2016-7125)</li> |
22 | 119 | </ul></li>
|
23 | 120 | <li>Bz2:
|
24 | 121 | <ul>
|
|
45 | 142 | </ul></li>
|
46 | 143 | <li>EXIF:
|
47 | 144 | <ul>
|
48 |
| - <li><?php bugfix(72627); ?> (Memory Leakage In exif_process_IFD_in_TIFF).</li> |
| 145 | + <li><?php bugfix(72627); ?> (Memory Leakage In exif_process_IFD_in_TIFF). (CVE-2016-7128)</li> |
49 | 146 | <li><?php bugfix(72735); ?> (Samsung picture thumb not read (zero size)).</li>
|
50 | 147 | </ul></li>
|
51 | 148 | <li>Filter:
|
|
64 | 161 | <li><?php bugfix(70315); ?> (500 Server Error but page is fully rendered).</li>
|
65 | 162 | <li><?php bugfix(72596); ?> (imagetypes function won't advertise WEBP support).</li>
|
66 | 163 | <li><?php bugfix(72604); ?> (imagearc() ignores thickness for full arcs).</li>
|
67 |
| - <li><?php bugfix(72697); ?> (select_colors write out-of-bounds).</li> |
| 164 | + <li><?php bugfix(72697); ?> (select_colors write out-of-bounds). (CVE-2016-7126)</li> |
68 | 165 | <li><?php bugfix(72709); ?> (imagesetstyle() causes OOB read for empty $styles).</li>
|
69 |
| - <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write access).</li> |
| 166 | + <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write access). (CVE-2016-7127)</li> |
70 | 167 | </ul></li>
|
71 | 168 | <li>Intl:
|
72 | 169 | <ul>
|
|
125 | 222 | <li>Wddx:
|
126 | 223 | <ul>
|
127 | 224 | <li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in wddx_serialize_value()).</li>
|
128 |
| - <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access) (Stas)</li> |
129 |
| - <li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li> |
130 |
| - <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid xml).</li> |
131 |
| - <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in php_wddx_pop_element).</li> |
| 225 | + <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access). (CVE-2016-7129)</li> |
| 226 | + <li><?php bugfix(72750); ?> (wddx_deserialize null dereference). (CVE-2016-7130)</li> |
| 227 | + <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid xml). (CVE-2016-7131)</li> |
| 228 | + <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in php_wddx_pop_element). (CVE-2016-7132)</li> |
132 | 229 | </ul></li>
|
133 | 230 | </ul>
|
134 | 231 | <!-- }}} --></section>
|
|
0 commit comments