php7.0 -mysql_PHP 7.0.9 正式发布

原标题:PHP 7.0.9 正式发布

PHP 7.0.9 正式发布了。

下载地址:http://php.net/distributions/php-7.0.9.tar.gz

改进日志如下:

- Core:

. Fixed bug #72508 (strange references after recursive function call and "switch" statement). (Laruence)

. Fixed bug #72513 (Stack-based buffer overflow vulnerability in virtual_file_ex). (Stas)

. Fixed bug #72573 (HTTP_PROXY is improperly trusted by some PHP libraries and applications). (Stas)

- bz2:

. Fixed bug #72613 (Inadequate error handling in bzread()). (Stas)

- CLI:

. Fixed bug #72484 (_FILENAME shows wrong path if the user specify router.php). (Laruence)

- COM:

. Fixed bug #72498 (variant_date_from_timestamp null dereference). (Anatol)

- Curl:

. Fixed bug #72541 (size_t overflow lead to heap corruption). (Stas)

- Exif:

. Fixed bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE). (Stas)

. Fixed bug #72618 (NULL Pointer Dereference in exif_process_user_comment). (Stas)

- GD:

. Fixed bug #43475 (Thick styled lines have scrambled patterns). (cmb)

. Fixed bug #53640 (XBM images require width to be multiple of 8). (cmb)

. Fixed bug #64641 (imagefilledpolygon doesn't draw horizontal line). (cmb)

. Fixed bug #72512 (gdImageTrueColorToPaletteBody allows arbitrary write/read access). (Pierre)

. Fixed bug #72519 (imagegif/output out-of-bounds access). (Pierre)

. Fixed bug #72558 (Integer overflow error within _gdContributionsAlloc()). (Pierre)

. Fixed bug #72482 (Ilegal write/read access caused by gdImageAALine overflow). (Pierre)

. Fixed bug #72494 (imagecropauto out-of-bounds access). (Pierre)

- Intl:

. Fixed bug #72533 (locale_accept_from_http out-of-bounds access). (Stas)

- Mbstring:

. Fixed bug #72405 (mb_ereg_replace - mbc_to_code (oniguruma) - oob read access). (Laruence)

. Fixed bug #72399 (Use-After-Free in MBString (search_re)). (Laruence)

- mcrypt:

. Fixed bug #72551, bug #72552 (In correct casting from size_t to int lead to heap overflow in mdecrypt_generic). (Stas)

- PDO_pgsql:

. Fixed bug #72570 (Segmentation fault when binding parameters on a query without placeholders). (Matteo)

- PCRE:

. Fixed bug #72476 (Memleak in jit_stack). (Laruence)

. Fixed bug #72463 (mail fails with invalid argument). (Anatol)

- Readline:

. Fixed bug #72538 (readline_redisplay crashes php). (Laruence)

- Standard:

. Fixed bug #72505 (readfile() mangles files larger than 2G). (Cschneid)

. Fixed bug #72306 (Heap overflow through proc_open and $env parameter). (Laruence)

- Session:

. Fixed bug #72531 (ps_files_cleanup_dir Buffer overflow). (Laruence)

. Fixed bug #72562 (Use After Free in unserialize() with Unexpected Session Deserialization). (Stas)

- SNMP:

. Fixed bug #72479 (Use After Free Vulnerability in SNMP with GC and unserialize()). (Stas)

- Streams:

. Fixed bug #72439 (Stream socket with remote address leads to a segmentation fault). (Laruence)

- XMLRPC:

. Fixed bug #72606 (heap-buffer-overflow (write) simplestring_addn simplestring.c). (Stas)

- Zip:

. Fixed bug #72520 (Stack-based buffer overflow vulnerability in php_stream_zip_opener). (Stas)

文章转载自:开源中国社区 [http://www.oschina.net] 取消转载自返回搜狐,查看更多

责任编辑:

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值