|
9 | 9 |
|
10 | 10 | <a id="PHP_8_5"></a> |
11 | 11 |
|
| 12 | +<section class="version" id="8.5.6"><!-- {{{ 8.5.6 --> |
| 13 | +<h3>Version 8.5.6</h3> |
| 14 | +<b><?php release_date('07-May-2026'); ?></b> |
| 15 | +<ul><li>Core: |
| 16 | +<ul> |
| 17 | + <li>Fixed bug <?php githubissuel('php/php-src', 19983); ?> (GC assertion failure with fibers, generators and destructors).</li> |
| 18 | + <li>Fixed ZEND_API mismatch on zend_ce_closure forward decl for Windows+Clang.</li> |
| 19 | + <li>Fixed bug <?php githubissuel('php/php-src', 21504); ?> (Incorrect RC-handling for ZEND_EXT_STMT op1).</li> |
| 20 | + <li>Fixed bug <?php githubissuel('php/php-src', 21478); ?> (Forward property operations to real instance for initialized lazy proxies).</li> |
| 21 | + <li>Fixed bug <?php githubissuel('php/php-src', 21605); ?> (Missing addref for Countable::count()).</li> |
| 22 | + <li>Fixed bug <?php githubissuel('php/php-src', 21699); ?> (Assertion failure in shutdown_executor when resolving self::/parent::/static:: callables if the error handler throws).</li> |
| 23 | + <li>Fixed bug <?php githubissuel('php/php-src', 21603); ?> (Missing addref for __unset).</li> |
| 24 | + <li>Fixed bug <?php githubissuel('php/php-src', 21760); ?> (Trait with class constant name conflict against enum case causes SEGV).</li> |
| 25 | +</ul></li> |
| 26 | +<li>CLI: |
| 27 | +<ul> |
| 28 | + <li>Fixed bug <?php githubissuel('php/php-src', 21754); ?> (`--rf` command line option with a method triggers ext/reflection deprecation warnings).</li> |
| 29 | +</ul></li> |
| 30 | +<li>Curl: |
| 31 | +<ul> |
| 32 | + <li>Add support for brotli and zstd on Windows.</li> |
| 33 | +</ul></li> |
| 34 | +<li>DOM: |
| 35 | +<ul> |
| 36 | + <li>Fixed <?php githubsecurityl('php/php-src', '4jhr-8w89-j733'); ?> and <?php githubissuel('php/php-src', 21566); ?> (Dom\XMLDocument::C14N() emits duplicate xmlns declarations after setAttributeNS()). (CVE-2026-7263)</li> |
| 37 | +</ul></li> |
| 38 | +<li>FPM: |
| 39 | +<ul> |
| 40 | + <li>Fixed <?php githubsecurityl('php/php-src', '7qg2-v9fj-4mwv'); ?> (XSS within status endpoint). (CVE-2026-6735)</li> |
| 41 | +</ul></li> |
| 42 | +<li>Iconv: |
| 43 | +<ul> |
| 44 | + <li>Fixed bug <?php githubissuel('php/php-src', 17399); ?> (iconv memory leak on bailout).</li> |
| 45 | +</ul></li> |
| 46 | +<li>Lexbor: |
| 47 | +<ul> |
| 48 | + <li>Upgrade to lexbor v2.7.0.</li> |
| 49 | +</ul></li> |
| 50 | +<li>MBString: |
| 51 | +<ul> |
| 52 | + <li>Fixed <?php githubsecurityl('php/php-src', 'wm6j-2649-pv75'); ?> (Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init()). (CVE-2026-7259)</li> |
| 53 | + <li>Fixed <?php githubsecurityl('php/php-src', '74r9-qxhc-fx53'); ?> (Out-of-bounds access in mbfl_name2encoding_ex()). (CVE-2026-6104)</li> |
| 54 | +</ul></li> |
| 55 | +<li>Opcache: |
| 56 | +<ul> |
| 57 | + <li>Fixed bug <?php githubissuel('php/php-src', 21158); ?> (JIT: Assertion jit->ra[var].flags & (1<<0) failed in zend_jit_use_reg).</li> |
| 58 | + <li>Fixed bug <?php githubissuel('php/php-src', 21593); ?> (Borked function JIT JMPNZ smart branch).</li> |
| 59 | + <li>Fixed bug <?php githubissuel('php/php-src', 21460); ?> (COND optimization regression).</li> |
| 60 | + <li>Fixed faulty returns out of zend_try block in zend_jit_trace().</li> |
| 61 | +</ul></li> |
| 62 | +<li>OpenSSL: |
| 63 | +<ul> |
| 64 | + <li>Fix memory leak regression in openssl_pbkdf2().</li> |
| 65 | + <li>Fix a bunch of memory leaks and crashes on edge cases.</li> |
| 66 | +</ul></li> |
| 67 | +<li>PDO_Firebird: |
| 68 | +<ul> |
| 69 | + <li>Fixed <?php githubsecurityl('php/php-src', 'w476-322c-wpvm'); ?> (SQL injection via NUL bytes in quoted strings). (CVE-2025-14179)</li> |
| 70 | +</ul></li> |
| 71 | +<li>PDO_PGSQL: |
| 72 | +<ul> |
| 73 | + <li>Fixed bug <?php githubissuel('php/php-src', 21683); ?> (pdo_pgsql throws with ATTR_PREFETCH=0 on empty result set).</li> |
| 74 | +</ul></li> |
| 75 | +<li>Phar: |
| 76 | +<ul> |
| 77 | + <li>Restore is_link handler in phar_intercept_functions_shutdown.</li> |
| 78 | + <li>Fixed bug <?php githubissuel('php/php-src', 21797); ?> (phar: NULL dereference in Phar::webPhar() when SCRIPT_NAME is absent from SAPI environment).</li> |
| 79 | + <li>Fix memory leak in Phar::offsetGet().</li> |
| 80 | + <li>Fix memory leak in phar_add_file().</li> |
| 81 | + <li>Fixed bug <?php githubissuel('php/php-src', 21799); ?> (phar: propagate phar_stream_flush return value from phar_stream_close).</li> |
| 82 | + <li>Fix memory leak in phar_verify_signature() when md_ctx is invalid.</li> |
| 83 | +</ul></li> |
| 84 | +<li>Random: |
| 85 | +<ul> |
| 86 | + <li>Fixed bug <?php githubissuel('php/php-src', 21731); ?> (Random\Engine\Xoshiro256StarStar::__unserialize() accepts all-zero state).</li> |
| 87 | +</ul></li> |
| 88 | +<li>Session: |
| 89 | +<ul> |
| 90 | + <li>Fixed memory leak when session GC callback return a refcounted value.</li> |
| 91 | +</ul></li> |
| 92 | +<li>SOAP: |
| 93 | +<ul> |
| 94 | + <li>Fixed <?php githubsecurityl('php/php-src', '85c2-q967-79q5'); ?> (Stale SOAP_GLOBAL(ref_map) pointer with Apache Map). (CVE-2026-6722)</li> |
| 95 | + <li>Fixed <?php githubsecurityl('php/php-src', 'm33r-qmcv-p97q'); ?> (Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION). (CVE-2026-7261)</li> |
| 96 | + <li>Fixed <?php githubsecurityl('php/php-src', 'hmxp-6pc4-f3vv'); ?> (Broken Apache map value NULL check). (CVE-2026-7262)</li> |
| 97 | +</ul></li> |
| 98 | +<li>SPL: |
| 99 | +<ul> |
| 100 | + <li>Fixed bug <?php githubissuel('php/php-src', 21499); ?> (RecursiveArrayIterator getChildren UAF after parent free).</li> |
| 101 | + <li>Fix concurrent iteration and deletion issues in SplObjectStorage.</li> |
| 102 | +</ul></li> |
| 103 | +<li>Sqlite3: |
| 104 | +<ul> |
| 105 | + <li>Fixed wrong free list comparator pointer type.</li> |
| 106 | +</ul></li> |
| 107 | +<li>Standard: |
| 108 | +<ul> |
| 109 | + <li>Fixed <?php githubsecurityl('php/php-src', '96wq-48vp-hh57'); ?> (Signed integer overflow of char array offset). (CVE-2026-7568)</li> |
| 110 | + <li>Fixed <?php githubsecurityl('php/php-src', 'm8rr-4c36-8gq4'); ?> (Consistently pass unsigned char to ctype.h functions). (CVE-2026-7258)</li> |
| 111 | +</ul></li> |
| 112 | +<li>Streams: |
| 113 | +<ul> |
| 114 | + <li>Fixed bug <?php githubissuel('php/php-src', 21468); ?> (Segfault in file_get_contents w/ a https URL and a proxy set).</li> |
| 115 | +</ul></li> |
| 116 | +<li>URI: |
| 117 | +<ul> |
| 118 | + <li>Fixed CVE-2026-42371 (uriparser before 1.0.1 has numeric truncation in text range comparison). (CVE-2026-42371)</li> |
| 119 | +</ul></li> |
| 120 | +</ul> |
| 121 | +<!-- }}} --></section> |
| 122 | + |
| 123 | + |
| 124 | + |
12 | 125 | <section class="version" id="8.5.5"><!-- {{{ 8.5.5 --> |
13 | 126 | <h3>Version 8.5.5</h3> |
14 | 127 | <b><?php release_date('09-Apr-2026'); ?></b> |
|
0 commit comments