diff options
author | Ferenc Kovacs <tyra3l@gmail.com> | 2016-06-22 03:06:31 +0200 |
---|---|---|
committer | Ferenc Kovacs <tyra3l@gmail.com> | 2016-06-22 03:06:31 +0200 |
commit | c6af288e3291eb4c1bad0bbd87efb1abd87d5dd8 (patch) | |
tree | 0a64499b860fa955a642ab4c934de44b1a020add | |
parent | fa8e1c026ae6db322b724c23811ec20c5bb9df05 (diff) | |
download | php-git-c6af288e3291eb4c1bad0bbd87efb1abd87d5dd8.tar.gz |
5.6.23
-rw-r--r-- | NEWS | 36 | ||||
-rw-r--r-- | configure.in | 2 | ||||
-rw-r--r-- | main/php_version.h | 4 |
3 files changed, 38 insertions, 4 deletions
@@ -1,18 +1,52 @@ PHP NEWS ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| -09 Jun 2016, PHP 5.6.23RC1 +23 Jun 2016, PHP 5.6.23 + +- Core: + . Fixed bug #72275 (Integer Overflow in json_encode()/json_decode()/ + json_utf8_to_utf16()). (Stas) + . Fixed bug #72400 (Integer Overflow in addcslashes/addslashes). (Stas) + . Fixed bug #72403 (Integer Overflow in Length of String-typed ZVAL). (Stas) - GD: + . Fixed bug #72298 (pass2_no_dither out-of-bounds access). (Stas) . Fixed bug #72337 (invalid dimensions can lead to crash) (Pierre) + . Fixed bug #72339 (Integer Overflow in _gd2GetHeader() resulting in + heap overflow). (Pierre) + . Fixed bug #72407 (NULL Pointer Dereference at _gdScaleVert). (Stas) + . Fixed bug #72446 (Integer Overflow in gdImagePaletteToTrueColor() resulting + in heap overflow). (Pierre) - Intl: . Fixed bug #70484 (selectordinal doesn't work with named parameters). (Anatol) +- mbstring: + . Fixed bug #72402 (_php_mb_regex_ereg_replace_exec - double free). (Stas) + +- mcrypt: + . Fixed bug #72455 (Heap Overflow due to integer overflows). (Stas) + +- Phar: + . Fixed bug #72321 (invalid free in phar_extract_file()). + (hji at dyntopia dot com) + +- SPL: + . Fixed bug #72262 (int/size_t confusion in SplFileObject::fread). (Stas) + . Fixed bug #72433 (Use After Free Vulnerability in PHP's GC algorithm and + unserialize). (Dmitry) + - OpenSSL: . Fixed bug #72140 (segfault after calling ERR_free_strings()). (Jakub Zelenka) +- WDDX: + . Fixed bug #72340 (Double Free Courruption in wddx_deserialize). (Stas) + +- zip: + . Fixed bug #72434 (ZipArchive class Use After Free Vulnerability in PHP's GC + algorithm and unserialize). (Dmitry) + 26 May 2016, PHP 5.6.22 - Core: diff --git a/configure.in b/configure.in index 90ac66e4a0..ced5a9255c 100644 --- a/configure.in +++ b/configure.in @@ -120,7 +120,7 @@ int zend_sprintf(char *buffer, const char *format, ...); PHP_MAJOR_VERSION=5 PHP_MINOR_VERSION=6 PHP_RELEASE_VERSION=23 -PHP_EXTRA_VERSION="RC1" +PHP_EXTRA_VERSION="" PHP_VERSION="$PHP_MAJOR_VERSION.$PHP_MINOR_VERSION.$PHP_RELEASE_VERSION$PHP_EXTRA_VERSION" PHP_VERSION_ID=`expr [$]PHP_MAJOR_VERSION \* 10000 + [$]PHP_MINOR_VERSION \* 100 + [$]PHP_RELEASE_VERSION` diff --git a/main/php_version.h b/main/php_version.h index a372295660..427d30cc50 100644 --- a/main/php_version.h +++ b/main/php_version.h @@ -3,6 +3,6 @@ #define PHP_MAJOR_VERSION 5 #define PHP_MINOR_VERSION 6 #define PHP_RELEASE_VERSION 23 -#define PHP_EXTRA_VERSION "RC1" -#define PHP_VERSION "5.6.23RC1" +#define PHP_EXTRA_VERSION "" +#define PHP_VERSION "5.6.23" #define PHP_VERSION_ID 50623 |