PHP 7.0.2 Released

The PHP development team announces the immediate availability of PHP

7.0.2. 31 reported bugs has been fixed, including 6 security related issues.

All PHP 7.0 users are encouraged to upgrade to this version.

downloads:

Current Stable PHP 7.0.2

  • php-7.0.2.tar.bz2 (sig) [13,661Kb] 07 Jan 2016 8c71b2ffd29311e4b7ac7788bd107554 9b1b75fbd9c92c6b0003b234e550965038826d11ea1f430bf279964da9da2236
  • php-7.0.2.tar.gz (sig) [17,654Kb] 07 Jan 2016 992667cdad38c5f77a4bb6c62c9a942f 040198aef3dc5f17c253c1282160aabc6a05ca0b18b3d6fc9213970363083412
  • php-7.0.2.tar.xz (sig) [11,115Kb] 07 Jan 2016 ce5964672e4ec0b66ff088a6bafde8c7 556121271a34c442b48e3d7fa3d3bbb4413d91897abbb92aaeced4a7df5f2ab2

Download source code [23.85MB]

VC14 x86 Non Thread Safe (2016-Jan-06 23:30:05)

  • Zip [20.77MB]
    sha1: 320e46d0bf7457da0fc7d30bff1c12705bea58b1
  • Debug Pack [15.22MB]
    sha1: c298aba55c4d7c03409c58c6b01cedf8e49df694

VC14 x86 Thread Safe (2016-Jan-06 23:30:05)

  • Zip [20.83MB]
    sha1: e8da25333b4bb2c1976496d0b1f5269a12c80c2a
  • Debug Pack [15.34MB]
    sha1: 01aadb764a536b8f28c0862acee935c7b7f10363

VC14 x64 Non Thread Safe (2016-Jan-06 23:30:08)

  • Zip [22.64MB]
    sha1: c28832768cfec16c888f7fd105ca6aa96650dc8b
  • Debug Pack [15.24MB]
    sha1: 6306302b5c5238cc6a4f68b82d94f46544c2a2af

VC14 x64 Thread Safe (2016-Jan-06 23:30:09)

  • Zip [22.76MB]
    sha1: 8546ad18e83553438ba71a0498169b64bf12d1c8
  • Debug Pack [15.38MB]
    sha1: 51386b5f904e2c0855fd1e05f24a9b7603dd8801

For source downloads of PHP 7.0.2 please visit our downloads page,

Windows source and binaries can be found on windows.php.net/download/.

The list of changes is recorded in the ChangeLog.

  • Core:
    • Fixed bug #71165 (-DGC_BENCH=1 doesn’t work on PHP7).
    • Fixed bug #71163 (Segmentation Fault: cleanup_unfinished_calls).
    • Fixed bug #71109 (ZEND_MOD_CONFLICTS(“xdebug”) doesn’t work).
    • Fixed bug #71092 (Segmentation fault with return type hinting).
    • Fixed bug memleak in header_register_callback.
    • Fixed bug #71067 (Local object in class method stays in memory for each call).
    • Fixed bug #66909 (configure fails utf8_to_mutf7 test).
    • Fixed bug #70781 (Extension tests fail on dynamic ext dependency).
    • Fixed bug #71089 (No check to duplicate zend_extension).
    • Fixed bug #71086 (Invalid numeric literal parse error within highlight_string() function).
    • Fixed bug #71154 (Incorrect HT iterator invalidation causes iterator reuse).
    • Fixed bug #52355 (Negating zero does not produce negative zero).
    • Fixed bug #66179 (var_export() exports float as integer).
    • Fixed bug #70804 (Unary add on negative zero produces positive zero).
  • CURL:
    • Fixed bug #71144 (Sementation fault when using cURL with ZTS).
  • DBA:
    • Fixed key leak with invalid resource.
  • Filter:
    • Fixed bug #71063 (filter_input(INPUT_ENV, ..) does not work).
  • FTP:
    • Implemented FR #55651 (Option to ignore the returned FTP PASV address).
  • FPM:
    • Fixed bug #70755 (fpm_log.c memory leak and buffer overflow).
  • GD:
    • Fixed bug #70976 (Memory Read via gdImageRotateInterpolated Array Index Out of Bounds).
  • Mbstring:
    • Fixed bug #71066 (mb_send_mail: Program terminated with signal SIGSEGV, Segmentation fault).
  • Opcache:
    • Fixed bug #71127 (Define in auto_prepend_file is overwrite).
  • PCRE:
    • Fixed bug #71178 (preg_replace with arrays creates [0] in replace array if not already set).
  • Readline:
    • Fixed bug #71094 (readline_completion_function corrupts static array on second TAB).
  • Session:
    • Fixed bug #71122 (Session GC may not remove obsolete session data).
  • SPL:
    • Fixed bug #71077 (ReflectionMethod for ArrayObject constructor returns wrong number of parameters).
    • Fixed bug #71153 (Performance Degradation in ArrayIterator with large arrays).
  • Standard:
    • Fixed bug #71270 (Heap BufferOver Flow in escapeshell functions).
  • WDDX:
    • Fixed bug #70661 (Use After Free Vulnerability in WDDX Packet Deserialization).
    • Fixed bug #70741 (Session WDDX Packet Deserialization Type Confusion Vulnerability).
  • XMLRPC:
    • Fixed bug #70728 (Type Confusion Vulnerability in PHP_to_XMLRPC_worker).

also php 5.6 and 5.5 has updated:

PHP 5.6.17 is available

The PHP development team announces the immediate availability of PHP 5.6.17. This is a security release. Several security bugs were fixed in this release. All PHP 5.6 users are encouraged to upgrade to this version.

For source downloads of PHP 5.6.17 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

PHP 5.5.31 is available

The PHP development team announces the immediate availability of PHP 5.5.31. This is a security release. Several security bugs were fixed in this release. All PHP 5.5 users are encouraged to upgrade to this version.

For source downloads of PHP 5.5.31 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

Source: http://php.net/archive/2016.php#id2016-01-07-2

Leave a Reply

Your email address will not be published. Required fields are marked *