动态网页脚本语言 PHP v7.0.9 发布

jopen 4年前
   <p style="text-align: center;"><img alt="" src="https://simg.open-open.com/show/3bb7500a642b48e629f66ed19aee15a1.jpg" /></p>    <p>PHP(PHP:Hypertext Preprocessor)是一种在电脑上执行的脚本语言,主要是用途在于处理动态网页,也包含了命令行执行接口(command line interface),或者产生图形使用者接口(GUI)程序。</p>    <h2>更新日志</h2>    <p>- Core:<br />   . Fixed bug #72508 (strange references after recursive function call and<br />     "switch" statement). (Laruence)<br />   . Fixed bug #72513 (Stack-based buffer overflow vulnerability in<br />     virtual_file_ex). (Stas)<br />   . Fixed bug #72573 (HTTP_PROXY is improperly trusted by some PHP libraries<br />     and applications). (Stas)</p>    <p>- bz2:<br />   . Fixed bug #72613 (Inadequate error handling in bzread()). (Stas)</p>    <p>- CLI:<br />   . Fixed bug #72484 (SCRIPT_FILENAME shows wrong path if the user specify<br />     router.php). (Laruence)</p>    <p>- COM:<br />   . Fixed bug #72498 (variant_date_from_timestamp null dereference). (Anatol)</p>    <p>- Curl:<br />   . Fixed bug #72541 (size_t overflow lead to heap corruption). (Stas)</p>    <p>- Exif:<br />   . Fixed bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE).<br />     (Stas)<br />   . Fixed bug #72618 (NULL Pointer Dereference in exif_process_user_comment).<br />     (Stas)</p>    <p>- GD:<br />   . Fixed bug #43475 (Thick styled lines have scrambled patterns). (cmb)<br />   . Fixed bug #53640 (XBM images require width to be multiple of 8). (cmb)<br />   . Fixed bug #64641 (imagefilledpolygon doesn't draw horizontal line). (cmb)<br />   . Fixed bug #72512 (gdImageTrueColorToPaletteBody allows arbitrary write/read<br />     access). (Pierre)<br />   . Fixed bug #72519 (imagegif/output out-of-bounds access). (Pierre)<br />   . Fixed bug #72558 (Integer overflow error within _gdContributionsAlloc()).<br />     (Pierre)<br />   . Fixed bug #72482 (Ilegal write/read access caused by gdImageAALine<br />     overflow). (Pierre)<br />   . Fixed bug #72494 (imagecropauto out-of-bounds access). (Pierre)</p>    <p>- Intl:<br />   . Fixed bug #72533 (locale_accept_from_http out-of-bounds access). (Stas)</p>    <p>- Mbstring:<br />   . Fixed bug #72405 (mb_ereg_replace - mbc_to_code (oniguruma) -<br />     oob read access). (Laruence)<br />   . Fixed bug #72399 (Use-After-Free in MBString (search_re)). (Laruence)</p>    <p>- mcrypt:<br />   . Fixed bug #72551, bug #72552 (In correct casting from size_t to int lead to<br />     heap overflow in mdecrypt_generic). (Stas)</p>    <p>- PDO_pgsql:<br />   . Fixed bug #72570 (Segmentation fault when binding parameters on a query<br />     without placeholders). (Matteo)</p>    <p>- PCRE:<br />   . Fixed bug #72476 (Memleak in jit_stack). (Laruence)<br />   . Fixed bug #72463 (mail fails with invalid argument). (Anatol)</p>    <p>- Readline:<br />   . Fixed bug #72538 (readline_redisplay crashes php). (Laruence)</p>    <p>- Standard:<br />   . Fixed bug #72505 (readfile() mangles files larger than 2G). (Cschneid)<br />   . Fixed bug #72306 (Heap overflow through proc_open and $env parameter).<br />     (Laruence)</p>    <p>- Session:<br />   . Fixed bug #72531 (ps_files_cleanup_dir Buffer overflow). (Laruence)<br />   . Fixed bug #72562 (Use After Free in unserialize() with Unexpected Session<br />     Deserialization). (Stas)</p>    <p>- SNMP:<br />   . Fixed bug #72479 (Use After Free Vulnerability in SNMP with GC and<br />     unserialize()). (Stas)</p>    <p>- Streams:<br />   . Fixed bug #72439 (Stream socket with remote address leads to a segmentation<br />     fault). (Laruence)</p>    <p>- XMLRPC:<br />   . Fixed bug #72606 (heap-buffer-overflow (write) simplestring_addn<br />     simplestring.c). (Stas)</p>    <p>- Zip:<br />   . Fixed bug #72520 (Stack-based buffer overflow vulnerability in<br />     php_stream_zip_opener). (Stas)<br />  </p>    <h2>下载</h2>    <ul>     <li><a href="/misc/goto?guid=4958992286768866878" rel="nofollow"><strong>Source code</strong> (zip)</a></li>     <li><a href="/misc/goto?guid=4958992286871854093" rel="nofollow"><strong>Source code</strong> (tar.gz)</a></li>    </ul>