PHP 5.5.7/5.4.23/5.3.28紧急发布.2013-12-13..上个版本是2013-11-14的5.5.6/5.4.22。全部修正了一个 OpenSSL的安全漏洞(CVE-2013-6420)5.3本来已停止常规开发也更新了。 总共修正了10几个Bug(包括Opcache的几个Bug)及安全漏洞。
完全改进:文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
Version 5.5.7
12-Dec-2013文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
- Core:
- CLI server:
- Added some MIME types to the CLI web server.
- Implemented FR #65917 (getallheaders() is not supported by the built-in web server) - also implements apache_response_headers()
- OPCache:
- readline:
- Fixed bug #65714 (PHP cli forces the tty to cooked mode).
- Openssl:
- Fixed memory corruption in openssl_x509_parse() (CVE-2013-6420).
文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
Version 5.4.23
12-Dec-2013文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
- Core:
- JSON:
- Fixed whitespace part of #64874 ("json_decode handles whitespace and case-sensitivity incorrectly").
- MySQLi:
- Fixed bug #66043 (Segfault calling bind_param() on mysqli).
- mysqlnd:
- OpenSSL:
- Fixed memory corruption in openssl_x509_parse() (CVE-2013-6420). (Stefan Esser).
- PDO:
- Fixed bug #65946 (sql_parser permanently converts values bound to strings).
Version 5.3.28
12-Dec-2013文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
- Openssl:
- Fixed handling null bytes in subjectAltName (CVE-2013-4073).
- Fixed memory corruption in openssl_x509_parse() (CVE-2013-6420). (Stefan Esser).
文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
下载:http://cn2.php.net/distributions/php-5.5.7.tar.bz2文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
http://cn2.php.net/distributions/php-5.4.23.tar.bz2文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
http://cn2.php.net/distributions/php-5.3.28.tar.bz2文章源自陈学虎-https://chenxuehu.com/article/2013/12/1408.html
评论