动态网页脚本语言 PHP v5.6.24 发布
jopen 8年前
<p style="text-align: center;"><img alt="" src="https://simg.open-open.com/show/3bb7500a642b48e629f66ed19aee15a1.jpg" /></p> <p>PHP(PHP:Hypertext Preprocessor)是一种在电脑上执行的脚本语言,主要是用途在于处理动态网页,也包含了命令行执行接口(command line interface),或者产生图形使用者接口(GUI)程序。</p> <h2>更新日志</h2> <p>- Core:<br /> . Fixed bug #71936 (Segmentation fault destroying HTTP_RAW_POST_DATA).<br /> (mike dot laspina at gmail dot com, Remi)<br /> . Fixed bug #72496 (Cannot declare public method with signature incompatible<br /> with parent private method). (Pedro Magalhães)<br /> . Fixed bug #72138 (Integer Overflow in Length of String-typed ZVAL). (Stas)<br /> . Fixed bug #72513 (Stack-based buffer overflow vulnerability in<br /> virtual_file_ex). (loianhtuan at gmail dot com)<br /> . Fixed bug #72562 (Use After Free in unserialize() with Unexpected Session<br /> Deserialization). (taoguangchen at icloud dot com)<br /> . Fixed bug #72573 (HTTP_PROXY is improperly trusted by some PHP libraries and<br /> applications). (CVE-2016-5385) (Stas)</p> <p>- bz2:<br /> . Fixed bug #72447 (Type Confusion in php_bz2_filter_create()). (gogil at <br /> stealien dot com).<br /> . Fixed bug #72613 (Inadequate error handling in bzread()). (Stas)</p> <p>- EXIF:<br /> . Fixed bug #50845 (exif_read_data() returns corrupted exif headers).<br /> (Bartosz Dziewoński)<br /> - EXIF:<br /> . Fixed bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE).<br /> (Stas)<br /> . Fixed bug #72618 (NULL Pointer Dereference in exif_process_user_comment).<br /> (Stas)</p> <p>- GD:<br /> . Fixed bug #43475 (Thick styled lines have scrambled patterns). (cmb)<br /> . Fixed bug #53640 (XBM images require width to be multiple of 8). (cmb)<br /> . Fixed bug #64641 (imagefilledpolygon doesn't draw horizontal line). (cmb)<br /> . Fixed bug #72512 (gdImageTrueColorToPaletteBody allows arbitrary write/read<br /> access). (Pierre)<br /> . Fixed bug #72519 (imagegif/output out-of-bounds access). (Pierre)<br /> . Fixed bug #72558 (Integer overflow error within _gdContributionsAlloc()).<br /> (CVE-2016-6207) (Pierre)</p> <p>- Intl:<br /> . Fixed bug #72533 (locale_accept_from_http out-of-bounds access). (Stas)</p> <p>- ODBC:<br /> . Fixed bug #69975 (PHP segfaults when accessing nvarchar(max) defined columns)</p> <p>- OpenSSL:<br /> . Fixed bug #71915 (openssl_random_pseudo_bytes is not fork-safe).<br /> (Jakub Zelenka)<br /> . Fixed bug #72336 (openssl_pkey_new does not fail for invalid DSA params).<br /> (Jakub Zelenka)</p> <p>- SNMP:<br /> . Fixed bug #72479 (Use After Free Vulnerability in SNMP with GC and<br /> unserialize()). (taoguangchen at icloud dot com)</p> <p>- SPL:<br /> . Fixed bug #55701 (GlobIterator throws LogicException). (Valentin VĂLCIU)</p> <p>- SQLite3:<br /> . Fixed bug #70628 (Clearing bindings on an SQLite3 statement doesn't work).<br /> (cmb)</p> <p>- Streams:<br /> . Fixed bug #72439 (Stream socket with remote address leads to a segmentation<br /> fault). (Laruence)</p> <p>- Xmlrpc:<br /> . Fixed bug #72606 (heap-buffer-overflow (write) simplestring_addn simplestring.c).<br /> (Stas)</p> <p>- Zip:<br /> . Fixed bug #72520 (Stack-based buffer overflow vulnerability in<br /> php_stream_zip_opener). (loianhtuan at gmail dot com)</p> <h2>下载</h2> <ul> <li><a href="/misc/goto?guid=4958992313251450616" rel="nofollow"><strong>Source code</strong> (zip)</a></li> <li><a href="/misc/goto?guid=4958992313345540941" rel="nofollow"><strong>Source code</strong> (tar.gz)</a></li> </ul>