summaryrefslogtreecommitdiff
path: root/lang
diff options
context:
space:
mode:
authortaca <taca@pkgsrc.org>2016-07-24 02:15:15 +0000
committertaca <taca@pkgsrc.org>2016-07-24 02:15:15 +0000
commitcca05dfb0691d55c022bce778a4b333b78a5a3bc (patch)
treebfca9371f8f04aa055d621513d5844963744cf1f /lang
parent7d5c56628553ec9f159b9938813ef1207e271273 (diff)
downloadpkgsrc-cca05dfb0691d55c022bce778a4b333b78a5a3bc.tar.gz
Update php55 to 5.5.38 (PHP 5.5.38).
Quote from release note: Note that according to our release schedule, PHP 5.5.38 is the last release of the PHP 5.5 branch. There may be additional release if we discover important security issues that warrant it, otherwise this release will be the final one in the PHP 5.5 branch. If your PHP installation is based on PHP 5.5, it may be a good time to start making the plans for the upgrade to PHP 5.6 or PHP 7.0. 21 Jul 2016, PHP 5.5.38 - BZip2: . Fixed bug #72613 (Inadequate error handling in bzread()). (Stas) - Core: . Fixed bug #70480 (php_url_parse_ex() buffer overflow read). (Stas) . Fixed bug #72513 (Stack-based buffer overflow vulnerability in virtual_file_ex). (loianhtuan at gmail dot com) . Fixed bug #72562 (Use After Free in unserialize() with Unexpected Session Deserialization). (taoguangchen at icloud dot com) . Fixed bug #72573 (HTTP_PROXY is improperly trusted by some PHP libraries and applications). (CVE-2016-5385) (Stas) - EXIF: . Fixed bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE). (Stas) . Fixed bug #72618 (NULL Pointer Dereference in exif_process_user_comment). (Stas) - GD: . Fixed bug #72512 (gdImageTrueColorToPaletteBody allows arbitrary write/read access). (Pierre) . Fixed bug #72519 (imagegif/output out-of-bounds access). (Pierre) . Fixed bug #72558 (Integer overflow error within _gdContributionsAlloc()). (CVE-2016-6207) (Pierre) - Intl: . Fixed bug #72533 (locale_accept_from_http out-of-bounds access). (Stas) - ODBC: . Fixed bug #69975 (PHP segfaults when accessing nvarchar(max) defined columns) - SNMP: . Fixed bug #72479 (Use After Free Vulnerability in SNMP with GC and unserialize()). (taoguangchen at icloud dot com) - Xmlrpc: . Fixed bug #72606 (heap-buffer-overflow (write) simplestring_addn simplestring.c). (Stas) - Zip: . Fixed bug #72520 (Stack-based buffer overflow vulnerability in php_stream_zip_opener). (loianhtuan at gmail dot com)
Diffstat (limited to 'lang')
-rw-r--r--lang/php/phpversion.mk4
-rw-r--r--lang/php55/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/lang/php/phpversion.mk b/lang/php/phpversion.mk
index 9664051c433..2ff50854fd4 100644
--- a/lang/php/phpversion.mk
+++ b/lang/php/phpversion.mk
@@ -1,4 +1,4 @@
-# $NetBSD: phpversion.mk,v 1.141 2016/06/24 15:27:57 taca Exp $
+# $NetBSD: phpversion.mk,v 1.142 2016/07/24 02:15:15 taca Exp $
#
# This file selects a PHP version, based on the user's preferences and
# the installed packages. It does not add a dependency on the PHP
@@ -81,7 +81,7 @@
PHPVERSION_MK= defined
# Define each PHP's version.
-PHP55_VERSION= 5.5.37
+PHP55_VERSION= 5.5.38
PHP56_VERSION= 5.6.23
PHP70_VERSION= 7.0.8
diff --git a/lang/php55/distinfo b/lang/php55/distinfo
index 809c98a83a9..52ae043b32b 100644
--- a/lang/php55/distinfo
+++ b/lang/php55/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.54 2016/06/24 15:23:00 taca Exp $
+$NetBSD: distinfo,v 1.55 2016/07/24 02:15:15 taca Exp $
-SHA1 (php-5.5.37.tar.bz2) = f999bf46a6b3a1adee8239c40e13e8ce06fd470a
-RMD160 (php-5.5.37.tar.bz2) = 349fbe9ea88423a2f6b0b8b47468401c3537ff8c
-SHA512 (php-5.5.37.tar.bz2) = d2da921f3efd858e1cb8004873e377ca9c5821d5269d5b8e7c9be830b183f4d18f737b14653f65a43c0957bdca994e09a476d77e3a29a11e357abc24618c4c0f
-Size (php-5.5.37.tar.bz2) = 13699851 bytes
+SHA1 (php-5.5.38.tar.bz2) = ac79d48510e4bfe8f376d009e3ecb5b734bbc3a1
+RMD160 (php-5.5.38.tar.bz2) = 2f1f0ff08c963975c6a624ecc83432cf48be3b39
+SHA512 (php-5.5.38.tar.bz2) = dd9e578013023cc8e9ab86ef129bf414682bca318c83816ff2f15be5f81863475737b48508d78542d4fe9dc7e31418bd9c0188b2d72745f069322f3ca4da9560
+Size (php-5.5.38.tar.bz2) = 13701262 bytes
SHA1 (patch-acinclude.m4) = 9e9c433e4cb96e469f7cf14b2064a0f41fc4568a
SHA1 (patch-aclocal.m4) = 46f192351e541453b1e32299acd1b4cfefc93cb2
SHA1 (patch-build_libtool.m4) = 3811edd697fd21eadc4f65cba35c6297141e8ff2