summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFerenc Kovacs <tyra3l@gmail.com>2016-06-22 03:06:31 +0200
committerFerenc Kovacs <tyra3l@gmail.com>2016-06-22 03:06:31 +0200
commitc6af288e3291eb4c1bad0bbd87efb1abd87d5dd8 (patch)
tree0a64499b860fa955a642ab4c934de44b1a020add
parentfa8e1c026ae6db322b724c23811ec20c5bb9df05 (diff)
downloadphp-git-c6af288e3291eb4c1bad0bbd87efb1abd87d5dd8.tar.gz
5.6.23
-rw-r--r--NEWS36
-rw-r--r--configure.in2
-rw-r--r--main/php_version.h4
3 files changed, 38 insertions, 4 deletions
diff --git a/NEWS b/NEWS
index f1000a5e06..61ea56c65d 100644
--- a/NEWS
+++ b/NEWS
@@ -1,18 +1,52 @@
PHP NEWS
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
-09 Jun 2016, PHP 5.6.23RC1
+23 Jun 2016, PHP 5.6.23
+
+- Core:
+ . Fixed bug #72275 (Integer Overflow in json_encode()/json_decode()/
+ json_utf8_to_utf16()). (Stas)
+ . Fixed bug #72400 (Integer Overflow in addcslashes/addslashes). (Stas)
+ . Fixed bug #72403 (Integer Overflow in Length of String-typed ZVAL). (Stas)
- GD:
+ . Fixed bug #72298 (pass2_no_dither out-of-bounds access). (Stas)
. Fixed bug #72337 (invalid dimensions can lead to crash) (Pierre)
+ . Fixed bug #72339 (Integer Overflow in _gd2GetHeader() resulting in
+ heap overflow). (Pierre)
+ . Fixed bug #72407 (NULL Pointer Dereference at _gdScaleVert). (Stas)
+ . Fixed bug #72446 (Integer Overflow in gdImagePaletteToTrueColor() resulting
+ in heap overflow). (Pierre)
- Intl:
. Fixed bug #70484 (selectordinal doesn't work with named parameters).
(Anatol)
+- mbstring:
+ . Fixed bug #72402 (_php_mb_regex_ereg_replace_exec - double free). (Stas)
+
+- mcrypt:
+ . Fixed bug #72455 (Heap Overflow due to integer overflows). (Stas)
+
+- Phar:
+ . Fixed bug #72321 (invalid free in phar_extract_file()).
+ (hji at dyntopia dot com)
+
+- SPL:
+ . Fixed bug #72262 (int/size_t confusion in SplFileObject::fread). (Stas)
+ . Fixed bug #72433 (Use After Free Vulnerability in PHP's GC algorithm and
+ unserialize). (Dmitry)
+
- OpenSSL:
. Fixed bug #72140 (segfault after calling ERR_free_strings()).
(Jakub Zelenka)
+- WDDX:
+ . Fixed bug #72340 (Double Free Courruption in wddx_deserialize). (Stas)
+
+- zip:
+ . Fixed bug #72434 (ZipArchive class Use After Free Vulnerability in PHP's GC
+ algorithm and unserialize). (Dmitry)
+
26 May 2016, PHP 5.6.22
- Core:
diff --git a/configure.in b/configure.in
index 90ac66e4a0..ced5a9255c 100644
--- a/configure.in
+++ b/configure.in
@@ -120,7 +120,7 @@ int zend_sprintf(char *buffer, const char *format, ...);
PHP_MAJOR_VERSION=5
PHP_MINOR_VERSION=6
PHP_RELEASE_VERSION=23
-PHP_EXTRA_VERSION="RC1"
+PHP_EXTRA_VERSION=""
PHP_VERSION="$PHP_MAJOR_VERSION.$PHP_MINOR_VERSION.$PHP_RELEASE_VERSION$PHP_EXTRA_VERSION"
PHP_VERSION_ID=`expr [$]PHP_MAJOR_VERSION \* 10000 + [$]PHP_MINOR_VERSION \* 100 + [$]PHP_RELEASE_VERSION`
diff --git a/main/php_version.h b/main/php_version.h
index a372295660..427d30cc50 100644
--- a/main/php_version.h
+++ b/main/php_version.h
@@ -3,6 +3,6 @@
#define PHP_MAJOR_VERSION 5
#define PHP_MINOR_VERSION 6
#define PHP_RELEASE_VERSION 23
-#define PHP_EXTRA_VERSION "RC1"
-#define PHP_VERSION "5.6.23RC1"
+#define PHP_EXTRA_VERSION ""
+#define PHP_VERSION "5.6.23"
#define PHP_VERSION_ID 50623