Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 05DA67A217 for ; Fri, 16 Sep 2016 16:09:26 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id AA65885EAD; Fri, 16 Sep 2016 16:09:25 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 3B80085EA2 for ; Fri, 16 Sep 2016 16:09:25 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id kyY6c9Yu8Bdd for ; Fri, 16 Sep 2016 16:09:24 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 760F885E4A for ; Fri, 16 Sep 2016 16:09:24 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 70A95FBD1; Fri, 16 Sep 2016 16:09:24 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1474042164111150" MIME-Version: 1.0 Date: Fri, 16 Sep 2016 16:09:24 +0000 From: "Takahiro Kambe" Subject: CVS commit: pkgsrc/lang To: pkgsrc-changes@NetBSD.org Reply-To: taca@netbsd.org X-Mailer: log_accum Message-Id: <20160916160924.70A95FBD1@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk This is a multi-part message in MIME format. --_----------=_1474042164111150 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="UTF-8" Module Name: pkgsrc Committed By: taca Date: Fri Sep 16 16:09:24 UTC 2016 Modified Files: pkgsrc/lang/php: phpversion.mk pkgsrc/lang/php56: distinfo Log Message: Update php56 to 5.6.26 (PHP 5.6.26). 15 Sep 2016, PHP 5.6.26 - Core: . Fixed bug #72907 (null pointer deref, segfault in gc_remove_zval_from_buffer (zend_gc.c:260)). (Laruence) - Dba: . Fixed bug #71514 (Bad dba_replace condition because of wrong API usage). (cmb) . Fixed bug #70825 (Cannot fetch multiple values with group in ini file). (cmb) - EXIF: . Fixed bug #72926 (Uninitialized Thumbail Data Leads To Memory Leakage in exif_process_IFD_in_TIFF). (Stas) - FTP: . Fixed bug #70195 (Cannot upload file using ftp_put to FTPES with require_ssl_reuse). (Benedict Singer) - GD: . Fixed bug #66005 (imagecopy does not support 1bit transparency on truecolor images). (cmb) . Fixed bug #72913 (imagecopy() loses single-color transparency on palette images). (cmb) . Fixed bug #68716 (possible resource leaks in _php_image_convert()). (cmb) - Intl: . Fixed bug #73007 (add locale length check). (Stas) - JSON: . Fixed bug #72787 (json_decode reads out of bounds). (Jakub Zelenka) - mbstring: . Fixed bug #66797 (mb_substr only takes 32-bit signed integer). (cmb) . Fixed bug #72910 (Out of bounds heap read in mbc_to_code() / triggered by mb_ereg_match()). (Stas) - MSSQL: . Fixed bug #72039 (Use of uninitialised value on mssql_guid_string). (Kalle) - Mysqlnd: . Fixed bug #72293 (Heap overflow in mysqlnd related to BIT fields). (Stas) - Phar: . Fixed bug #72928 (Out of bound when verify signature of zip phar in phar_parse_zipfile). (Stas) . Fixed bug #73035 (Out of bound when verify signature of tar phar in phar_parse_tarfile). (Stas) - PDO: . Fixed bug #60665 (call to empty() on NULL result using PDO::FETCH_LAZY returns false). (cmb) - PDO_pgsql: . Implemented FR #72633 (Postgres PDO lastInsertId() should work without specifying a sequence). (Pablo Santiago Sánchez, Matteo) . Fixed bug #72759 (Regression in pgo_pgsql). (Anatol) - SPL: . Fixed bug #73029 (Missing type check when unserializing SplArray). (Stas) - Standard: . Fixed bug #72823 (strtr out-of-bound access). (cmb) . Fixed bug #72278 (getimagesize returning FALSE on valid jpg). (cmb) . Fixed bug #65550 (get_browser() incorrectly parses entries with "+" sign). (cmb) . Fixed bug #71882 (Negative ftruncate() on php://memory exhausts memory). (cmb) . Fixed bug #73011 (integer overflow in fgets cause heap corruption). (Stas) . Fixed bug #73017 (memory corruption in wordwrap function). (Stas) . Fixed bug #73045 (integer overflow in fgetcsv caused heap corruption). (Stas) . Fixed bug #73052 (Memory Corruption in During Deserialized-object Destruction) (Stas) - Streams: . Fixed bug #72853 (stream_set_blocking doesn't work). (Laruence) - Wddx: . Fixed bug #72860 (wddx_deserialize use-after-free). (Stas) . Fixed bug #73065 (Out-Of-Bounds Read in php_wddx_push_element). (Stas) - XML: . Fixed bug #72085 (SEGV on unknown address zif_xml_parse). (cmb) . Fixed bug #72927 (integer overflow in xml_utf8_encode). (Stas) - ZIP: . Fixed bug #68302 (impossible to compile php with zip support). (cmb) To generate a diff of this commit: cvs rdiff -u -r1.155 -r1.156 pkgsrc/lang/php/phpversion.mk cvs rdiff -u -r1.33 -r1.34 pkgsrc/lang/php56/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1474042164111150 Content-Disposition: inline Content-Length: 1976 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/lang/php/phpversion.mk diff -u pkgsrc/lang/php/phpversion.mk:1.155 pkgsrc/lang/php/phpversion.mk:1.156 --- pkgsrc/lang/php/phpversion.mk:1.155 Mon Sep 12 15:38:01 2016 +++ pkgsrc/lang/php/phpversion.mk Fri Sep 16 16:09:24 2016 @@ -1,4 +1,4 @@ -# $NetBSD: phpversion.mk,v 1.155 2016/09/12 15:38:01 taca Exp $ +# $NetBSD: phpversion.mk,v 1.156 2016/09/16 16:09:24 taca Exp $ # # This file selects a PHP version, based on the user's preferences and # the installed packages. It does not add a dependency on the PHP @@ -87,7 +87,7 @@ PHPVERSION_MK= defined # Define each PHP's version. -PHP56_VERSION= 5.6.25 +PHP56_VERSION= 5.6.26 PHP70_VERSION= 7.0.10 PHP71_VERSION= 7.1.0RC1 Index: pkgsrc/lang/php56/distinfo diff -u pkgsrc/lang/php56/distinfo:1.33 pkgsrc/lang/php56/distinfo:1.34 --- pkgsrc/lang/php56/distinfo:1.33 Fri Aug 19 03:29:00 2016 +++ pkgsrc/lang/php56/distinfo Fri Sep 16 16:09:24 2016 @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.33 2016/08/19 03:29:00 taca Exp $ +$NetBSD: distinfo,v 1.34 2016/09/16 16:09:24 taca Exp $ -SHA1 (php-5.6.25.tar.bz2) = 7d0274f6f0e8db35edc56d47d2d65fdf851820b9 -RMD160 (php-5.6.25.tar.bz2) = 04b56cc6c3f7b649dd37e2c8bdaea31f03fa4a5e -SHA512 (php-5.6.25.tar.bz2) = 675a5244822f00abd93ec4ef31c539a4c305cab0aaf4735f6cbe037507853ba3f1691fcbaf1cf54dde106d918c22337bb600ed78c38351d4405da8ffdc5d50e0 -Size (php-5.6.25.tar.bz2) = 14923535 bytes +SHA1 (php-5.6.26.tar.bz2) = d0e05dbc4d1be0e316cadee64f5bda83a16932a9 +RMD160 (php-5.6.26.tar.bz2) = eedd93ab6808d86055a7e5f41ca3b92ea7feee63 +SHA512 (php-5.6.26.tar.bz2) = fcac6ff1db2d3a897ce7253735216b3784568167d7e1c3738409c45f72bdce6708d42c6935c13c28f16da15218213b202e959fb68355b5c692fdc54a7393b553 +Size (php-5.6.26.tar.bz2) = 14927510 bytes SHA1 (patch-acinclude.m4) = b38fc34c3a3847dc317e8e286612b21ec8fd5ce8 SHA1 (patch-configure) = 5d76f71aa903efa3c3491b908ff76419aa4af27c SHA1 (patch-ext_gd_config.m4) = b92ab4c7fe8aceaef7787a607a7d2eac258fee19 --_----------=_1474042164111150--