动态网页脚本语言 PHP v5.6.22 v5.5.36 发布
jopen 8年前
<p style="text-align: center;"><img alt="" src="https://simg.open-open.com/show/3bb7500a642b48e629f66ed19aee15a1.jpg" /></p> <p>PHP(PHP:Hypertext Preprocessor)是一种在电脑上执行的脚本语言,主要是用途在于处理动态网页,也包含了命令行执行接口(command line interface),或者产生图形使用者接口(GUI)程序。</p> <h2>更新日志</h2> <h3>v5.6.22</h3> <ul> <li>Core: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990824551468965">#72172</a> (zend_hex_strtod should not use strlen).</li> <li>Fixed bug <a href="/misc/goto?guid=4958990824654354548">#72114</a> (Integer underflow / arbitrary null write in fread/gzread). (CVE-2016-5096)</li> <li>Fixed bug <a href="/misc/goto?guid=4958990824740304203">#72135</a> (Integer Overflow in php_html_entities). (CVE-2016-5094)</li> </ul> </li> <li>GD: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990824837205256">#72227</a> (imagescale out-of-bounds read). (CVE-2013-7456)</li> </ul> </li> <li>Intl: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990824924156769">#64524</a> (Add intl.use_exceptions to php.ini-*).</li> <li>Fixed bug <a href="/misc/goto?guid=4958990825030863394">#72241</a> (get_icu_value_internal out-of-bounds read). (CVE-2016-5093)</li> </ul> </li> <li>Postgres: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990825123024321">#72151</a> (mysqli_fetch_object changed behaviour).</li> </ul> </li> </ul> <h3>v5.5.36</h3> <ul> <li>Core: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990824654354548">#72114</a> (Integer underflow / arbitrary null write in fread/gzread). (CVE-2016-5096)</li> <li>Fixed bug <a href="/misc/goto?guid=4958990824740304203">#72135</a> (Integer Overflow in php_html_entities). (CVE-2016-5094)</li> </ul> </li> <li>GD: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990824837205256">#72227</a> (imagescale out-of-bounds read). (CVE-2013-7456)</li> </ul> </li> <li>Intl: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990825030863394">#72241</a> (get_icu_value_internal out-of-bounds read). (CVE-2016-5093)</li> </ul> </li> <li>Phar: <ul> <li>Fixed bug <a href="/misc/goto?guid=4958990825251332375">#71331</a> (Uninitialized pointer in phar_make_dirstream()). (CVE-2016-4343)</li> </ul> </li> </ul> <h2>下载</h2> <ul> <li>v5.5.36 <ul> <li><a href="/misc/goto?guid=4958990825345450199">php-5.5.36.tar.bz2</a> <a href="/misc/goto?guid=4958990825440974268">(sig)</a> </li> <li><a href="/misc/goto?guid=4958990825531822770">php-5.5.36.tar.gz</a> <a href="/misc/goto?guid=4958990825626653087">(sig)</a></li> <li><a href="/misc/goto?guid=4958990825715964827">php-5.5.36.tar.xz</a> <a href="/misc/goto?guid=4958990825798924057">(sig)</a> </li> <li><a href="/misc/goto?guid=4958990825891462258">Windows downloads</a></li> </ul> </li> <li>v5.6.22 <ul> <li><a href="/misc/goto?guid=4958990825980998941">php-5.6.22.tar.bz2</a> <a href="/misc/goto?guid=4958990826071068190">(sig)</a></li> <li><a href="/misc/goto?guid=4958990826169978216">php-5.6.22.tar.gz</a> <a href="/misc/goto?guid=4958990826267613555">(sig)</a></li> <li><a href="/misc/goto?guid=4958990826361099310">php-5.6.22.tar.xz</a> <a href="/misc/goto?guid=4958990826452039453">(sig)</a></li> <li><a href="/misc/goto?guid=4958990826549722543">Windows downloads</a></li> </ul> </li> </ul> <p style="text-align: center;"> </p>