diff options
author | taca <taca@pkgsrc.org> | 2019-12-21 06:59:20 +0000 |
---|---|---|
committer | taca <taca@pkgsrc.org> | 2019-12-21 06:59:20 +0000 |
commit | 5f68d07ab7fd4d531105f46ee62fd6aeaeb4a65b (patch) | |
tree | f05dc610a1619b65f94766022dabdba1ba6a5f5d | |
parent | 0a8a9038dc11cc429dafd69c21e9a27d6c9a3863 (diff) | |
download | pkgsrc-5f68d07ab7fd4d531105f46ee62fd6aeaeb4a65b.tar.gz |
lang/php73: update to 7.3.13
Update php73 to 7.3.13, including security fixes.
19 Dec 2019, PHP 7.3.13
- Bcmath:
. Fixed bug #78878 (Buffer underflow in bc_shift_addsub). (CVE-2019-11046).
(cmb)
- Core:
. Fixed bug #78862 (link() silently truncates after a null byte on Windows).
(CVE-2019-11044). (cmb)
. Fixed bug #78863 (DirectoryIterator class silently truncates after a null
byte). (CVE-2019-11045). (cmb)
. Fixed bug #78943 (mail() may release string with refcount==1 twice).
(CVE-2019-11049). (cmb)
. Fixed bug #78787 (Segfault with trait overriding inherited private shadow
property). (Nikita)
. Fixed bug #78868 (Calling __autoload() with incorrect EG(fake_scope) value).
(Antony Dovgal, Dmitry)
. Fixed bug #78296 (is_file fails to detect file). (cmb)
- EXIF:
. Fixed bug #78793 (Use-after-free in exif parsing under memory sanitizer).
(CVE-2019-11050). (Nikita)
. Fixed bug #78910 (Heap-buffer-overflow READ in exif). (CVE-2019-11047).
(Nikita)
- GD:
. Fixed bug #78849 (GD build broken with -D SIGNED_COMPARE_SLOW). (cmb)
- MBString:
. Upgraded bundled Oniguruma to 6.9.4. (cmb)
- OPcache:
. Fixed potential ASLR related invalid opline handler issues. (cmb)
. Fixed $x = (bool)$x; with opcache (should emit undeclared variable notice).
(Tyson Andre)
- PCRE:
. Fixed bug #78853 (preg_match() may return integer > 1). (cmb)
- Standard:
. Fixed bug #78759 (array_search in $GLOBALS). (Nikita)
. Fixed bug #77638 (var_export'ing certain class instances segfaults). (cmb)
. Fixed bug #78840 (imploding $GLOBALS crashes). (cmb)
. Fixed bug #78833 (Integer overflow in pack causes out-of-bound access).
(cmb)
. Fixed bug #78814 (strip_tags allows / in tag name => whitelist bypass).
(cmb)
-rw-r--r-- | lang/php/phpversion.mk | 4 | ||||
-rw-r--r-- | lang/php73/distinfo | 10 |
2 files changed, 7 insertions, 7 deletions
diff --git a/lang/php/phpversion.mk b/lang/php/phpversion.mk index ece7789c647..4c2ffc4a02e 100644 --- a/lang/php/phpversion.mk +++ b/lang/php/phpversion.mk @@ -1,4 +1,4 @@ -# $NetBSD: phpversion.mk,v 1.280 2019/12/16 16:13:11 taca Exp $ +# $NetBSD: phpversion.mk,v 1.281 2019/12/21 06:59:20 taca Exp $ # # This file selects a PHP version, based on the user's preferences and # the installed packages. It does not add a dependency on the PHP @@ -89,7 +89,7 @@ PHPVERSION_MK= defined # Define each PHP's version. PHP56_VERSION= 5.6.40 PHP72_VERSION= 7.2.25 -PHP73_VERSION= 7.3.12 +PHP73_VERSION= 7.3.13 PHP74_VERSION= 7.4.0 # Define initial release of major version. diff --git a/lang/php73/distinfo b/lang/php73/distinfo index 3437e61e5ca..ac40942d07a 100644 --- a/lang/php73/distinfo +++ b/lang/php73/distinfo @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.16 2019/12/16 15:58:19 taca Exp $ +$NetBSD: distinfo,v 1.17 2019/12/21 06:59:20 taca Exp $ -SHA1 (php-7.3.12.tar.xz) = eee16ac54b148c6826c9ff29a58a114be42f1eeb -RMD160 (php-7.3.12.tar.xz) = 236a3aa08bf7a6e69c2ca61596df04e782e496ab -SHA512 (php-7.3.12.tar.xz) = e3022da2c9c216793c9f44d530a7217f51fd1d99a3dfb203eecc4a149fd29ab31facccfc2fb67af8241c9a83d3543020fcfce403dfc12142b03fa7458d600be3 -Size (php-7.3.12.tar.xz) = 12095212 bytes +SHA1 (php-7.3.13.tar.xz) = 3c4b349c698b3f515d0f6acc4a72955c4eb075df +RMD160 (php-7.3.13.tar.xz) = 72bed7868a6f1144ebfb04434accd92fbdeaec29 +SHA512 (php-7.3.13.tar.xz) = d0624b3b841fed49d9cea56b17e7c8c7abf8e6572832b6f86c98f48c23f86690c310b460eae27a6fcd41fbfbc2e8a4b56f6bfb0c738fa1db36ce3795454d7798 +Size (php-7.3.13.tar.xz) = 12102012 bytes SHA1 (patch-configure) = 08b80528ba90c705398e8841c232382663479a3b SHA1 (patch-disable-filter-url) = 0a2c19c18f089448a8d842e99738b292ab9e5640 SHA1 (patch-ext_gd_config.m4) = eaecfb31b18700dd642c067ed82748d4f6be2335 |