Skip to content

Commit 0e24a7a

Browse files
authored
Merge pull request #1 from php/master
upd
2 parents 84dd0bb + 4b3f069 commit 0e24a7a

25 files changed

+833
-35
lines changed

ChangeLog-5.php

Lines changed: 104 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,108 @@
77
?>
88

99
<h1>PHP 5 ChangeLog</h1>
10+
<section class="version" id="5.6.23"><!-- {{{ 5.6.23 -->
11+
<h3>Version 5.6.23</h3>
12+
<b><?php release_date('23-Jun-2016'); ?></b>
13+
<ul><li>Core:
14+
<ul>
15+
<li><?php bugfix(72268); ?> (Integer Overflow in nl2br()).</li>
16+
<li><?php bugfix(72275); ?> (Integer Overflow in json_encode()/json_decode()/ json_utf8_to_utf16()).</li>
17+
<li><?php bugfix(72400); ?> (Integer Overflow in addcslashes/addslashes).</li>
18+
<li><?php bugfix(72403); ?> (Integer Overflow in Length of String-typed ZVAL).</li>
19+
</ul></li>
20+
<li>Date:
21+
<ul>
22+
<li><?php bugfix(63740); ?> (strtotime seems to use both sunday and monday as start of week).</li>
23+
</ul></li>
24+
<li>GD:
25+
<ul>
26+
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li>
27+
<li><?php bugfix(72298); ?> (pass2_no_dither out-of-bounds access).</li>
28+
<li><?php bugfix(72337); ?> (invalid dimensions can lead to crash).</li>
29+
<li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow). (CVE-2016-5766)</li>
30+
<li><?php bugfix(72407); ?> (NULL Pointer Dereference at _gdScaleVert).</li>
31+
<li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow). (CVE-2016-5767)</li>
32+
</ul></li>
33+
<li>Intl:
34+
<ul>
35+
<li><?php bugfix(70484); ?> (selectordinal doesn't work with named parameters).</li>
36+
</ul></li>
37+
<li>mbstring:
38+
<ul>
39+
<li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free). (CVE-2016-5768)</li>
40+
</ul></li>
41+
<li>mcrypt:
42+
<ul>
43+
<li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows). (CVE-2016-5769)</li>
44+
</ul></li>
45+
<li>OpenSSL:
46+
<ul>
47+
<li><?php bugfix(72140); ?> (segfault after calling ERR_free_strings()).</li>
48+
</ul></li>
49+
<li>Phar:
50+
<ul>
51+
<li><?php bugfix(72321); ?> (invalid free in phar_extract_file()).</li>
52+
</ul></li>
53+
<li>SPL:
54+
<ul>
55+
<li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread). (CVE-2016-5770)</li>
56+
<li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5771)</li>
57+
</ul></li>
58+
<li>WDDX:
59+
<ul>
60+
<li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize). (CVE-2016-5772)</li>
61+
</ul></li>
62+
<li>zip:
63+
<ul>
64+
<li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)</li>
65+
</ul></li>
66+
</ul>
67+
<!-- }}} --></section>
68+
69+
<section class="version" id="5.5.37"><!-- {{{ 5.5.37 -->
70+
<h3>Version 5.5.37</h3>
71+
<b><?php release_date('23-Jun-2016'); ?></b>
72+
<ul><li>Core:
73+
<ul>
74+
<li><?php bugfix(72268); ?> (Integer Overflow in nl2br()).</li>
75+
<li><?php bugfix(72275); ?> (Integer Overflow in json_encode()/json_decode()/ json_utf8_to_utf16()).</li>
76+
<li><?php bugfix(72400); ?> (Integer Overflow in addcslashes/addslashes).</li>
77+
<li><?php bugfix(72403); ?> (Integer Overflow in Length of String-typed ZVAL).</li>
78+
</ul></li>
79+
<li>GD:
80+
<ul>
81+
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li>
82+
<li><?php bugfix(72298); ?> (pass2_no_dither out-of-bounds access).</li>
83+
<li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow). (CVE-2016-5766)</li>
84+
<li><?php bugfix(72407); ?> (NULL Pointer Dereference at _gdScaleVert).</li>
85+
<li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow). (CVE-2016-5767)</li>
86+
</ul></li>
87+
<li>mbstring:
88+
<ul>
89+
<li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free). (CVE-2016-5768)</li>
90+
</ul></li>
91+
</ul></li>
92+
<li>mcrypt:
93+
<ul>
94+
<li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows). (CVE-2016-5769)</li>
95+
</ul></li>
96+
<li>SPL:
97+
<ul>
98+
<li><?php bugfix(72262); ?> (int/size_t confusion in SplFileObject::fread). (CVE-2016-5770)</li>
99+
<li><?php bugfix(72433); ?> (Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5771)</li>
100+
</ul></li>
101+
<li>WDDX:
102+
<ul>
103+
<li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize). (CVE-2016-5772)</li>
104+
</ul></li>
105+
<li>zip:
106+
<ul>
107+
<li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)</li>
108+
</ul></li>
109+
</ul>
110+
<!-- }}} --></section>
111+
10112
<section class="version" id="5.6.22"><!-- {{{ 5.6.22 -->
11113
<h3>Version 5.6.22</h3>
12114
<b><?php release_date('26-May-2016'); ?></b>
@@ -27,7 +129,7 @@
27129
</ul></li>
28130
<li>Postgres:
29131
<ul>
30-
<li><?php bugfix(72151); ?> (mysqli_fetch_object changed behaviour).</li>
132+
<li><?php bugfix(72151); ?> (mysqli_fetch_object changed behaviour). Patch to <?php bugl(71820) ?> is reverted.</li>
31133
</ul></li>
32134
</ul>
33135
<!-- }}} --></section>
@@ -763,7 +865,7 @@
763865
<li>GD:
764866
<ul>
765867
<li><?php bugfix(53156); ?> (imagerectangle problem with point ordering).</li>
766-
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder).</li>
868+
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li>
767869
<li><?php bugfix(70102); ?> (imagecreatefromwebm() shifts colors).</li>
768870
<li><?php bugfix(66590); ?> (imagewebp() doesn't pad to even length).</li>
769871
<li><?php bugfix(66882); ?> (imagerotate by -90 degrees truncates image by 1px).</li>

ChangeLog-7.php

Lines changed: 97 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,100 @@
77

88
<h1>PHP 7 ChangeLog</h1>
99

10+
<section class="version" id="7.0.8"><!-- {{{ 7.0.8 -->
11+
<h3>Version 7.0.8</h3>
12+
<b><?php release_date('23-Jun-2016'); ?></b>
13+
<ul><li>Core:
14+
<ul>
15+
<li><?php bugfix(72218); ?> (If host name cannot be resolved then PHP 7 crashes).</li>
16+
<li><?php bugfix(72221); ?> (segfault, past-the-end access).</li>
17+
<li><?php bugfix(72268); ?> (Integer Overflow in nl2br()).</li>
18+
<li><?php bugfix(72275); ?> (Integer Overflow in json_encode()/json_decode()/ json_utf8_to_utf16()).</li>
19+
<li><?php bugfix(72400); ?> (Integer Overflow in addcslashes/addslashes).</li>
20+
<li><?php bugfix(72403); ?> (Integer Overflow in Length of String-typed ZVAL).</li>
21+
</ul></li>
22+
<li>Date:
23+
<ul>
24+
<li><?php bugfix(63740); ?> (strtotime seems to use both sunday and monday as start of week).</li>
25+
</ul></li>
26+
<li>FPM:
27+
<ul>
28+
<li><?php bugfix(72308); ?> (fastcgi_finish_request and logging environment variables).</li>
29+
</ul></li>
30+
<li>GD:
31+
<ul>
32+
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li>
33+
<li><?php bugfix(72298); ?> (pass2_no_dither out-of-bounds access).</li>
34+
<li><?php bugfix(72337); ?> (invalid dimensions can lead to crash).</li>
35+
<li><?php bugfix(72339); ?> (Integer Overflow in _gd2GetHeader() resulting in heap overflow). (CVE-2016-5766)</li>
36+
<li><?php bugfix(72407); ?> (NULL Pointer Dereference at _gdScaleVert).</li>
37+
<li><?php bugfix(72446); ?> (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow). (CVE-2016-5767)</li>
38+
</ul></li>
39+
<li>Intl:
40+
<ul>
41+
<li><?php bugfix(70484); ?> (selectordinal doesn't work with named parameters).</li>
42+
</ul></li>
43+
<li>mbstring:
44+
<ul>
45+
<li><?php bugfix(72402); ?> (_php_mb_regex_ereg_replace_exec - double free). (CVE-2016-5768)</li>
46+
</ul></li>
47+
<li>mcrypt:
48+
<ul>
49+
<li><?php bugfix(72455); ?> (Heap Overflow due to integer overflows). (CVE-2016-5769)</li>
50+
</ul></li>
51+
<li>OpenSSL:
52+
<ul>
53+
<li><?php bugfix(72140); ?> (segfault after calling ERR_free_strings()).</li>
54+
</ul></li>
55+
<li>PCRE:
56+
<ul>
57+
<li><?php bugfix(72143); ?> (preg_replace uses int instead of size_t).</li>
58+
</ul></li>
59+
<li>PDO_pgsql:
60+
<ul>
61+
<li><?php bugfix(71573); ?> (Segfault (core dumped) if paramno beyond bound).</li>
62+
<li><?php bugfix(72294); ?> (Segmentation fault/invalid pointer in connection with pgsql_stmt_dtor).</li>
63+
</ul></li>
64+
<li>Phar:
65+
<ul>
66+
<li><?php bugfix(72321); ?> (invalid free in phar_extract_file()).</li>
67+
</ul></li>
68+
<li>Phpdbg:
69+
<ul>
70+
<li><?php bugfix(72284); ?> (phpdbg fatal errors with coverage).</li>
71+
</ul></li>
72+
<li>Postgres:
73+
<ul>
74+
<li><?php bugfix(72195); ?> (pg_pconnect/pg_connect cause use-after-free).</li>
75+
<li><?php bugfix(72197); ?> (pg_lo_create arbitrary read).</li>
76+
</ul></li>
77+
<li>Standard:
78+
<ul>
79+
<li><?php bugfix(72017); ?> (range() with float step produces unexpected result).</li>
80+
<li><?php bugfix(72193); ?> (dns_get_record returns array containing elements of type 'unknown').</li>
81+
<li><?php bugfix(72229); ?> (Wrong reference when serialize/unserialize an object).</li>
82+
<li><?php bugfix(72300); ?> (ignore_user_abort(false) has no effect).</li>
83+
</ul></li>
84+
<li>WDDX:
85+
<ul>
86+
<li><?php bugfix(72340); ?> (Double Free Courruption in wddx_deserialize). (CVE-2016-5772)</li>
87+
</ul></li>
88+
<li>XML:
89+
<ul>
90+
<li><?php bugfix(72206); ?> (xml_parser_create/xml_parser_free leaks mem).</li>
91+
</ul></li>
92+
<li>XMLRPC:
93+
<ul>
94+
<li><?php bugfix(72155); ?> (use-after-free caused by get_zval_xmlrpc_type).</li>
95+
</ul></li>
96+
<li>Zip:
97+
<ul>
98+
<li><?php bugfix(72258); ?> (ZipArchive converts filenames to unrecoverable form).</li>
99+
<li><?php bugfix(72434); ?> (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)</li>
100+
</ul></li>
101+
</ul>
102+
<!-- }}} --></section>
103+
10104
<section class="version" id="7.0.7"><!-- {{{ 7.0.7 -->
11105
<h3>Version 7.0.7</h3>
12106
<b><?php release_date('26-May-2016'); ?></b>
@@ -36,6 +130,7 @@
36130
</ul></li>
37131
<li>Intl:
38132
<ul>
133+
<li><?php bugfix(64524); ?> (Add intl.use_exceptions to php.ini-*).</li>
39134
<li><?php bugfix(72241); ?> (get_icu_value_internal out-of-bounds read). (CVE-2016-5093)</li>
40135
</ul></li>
41136
<li>JSON:
@@ -70,7 +165,7 @@
70165
<ul>
71166
<li><?php bugfix(72028); ?> (pg_query_params(): NULL converts to empty string).</li>
72167
<li><?php bugfix(71062); ?> (pg_convert() doesn't accept ISO 8601 for datatype timestamp).</li>
73-
<li><?php bugfix(72151); ?> (mysqli_fetch_object changed behaviour).</li>
168+
<li><?php bugfix(72151); ?> (mysqli_fetch_object changed behaviour). Patch to <?php bugl(71820) ?> is reverted.</li>
74169
</ul></li>
75170
<li>Reflection:
76171
<ul>
@@ -859,7 +954,7 @@
859954
<li>GD:
860955
<ul>
861956
<li><?php bugfix(53156); ?> (imagerectangle problem with point ordering).</li>
862-
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder).</li>
957+
<li><?php bugfix(66387); ?> (Stack overflow with imagefilltoborder). (CVE-2015-8874)</li>
863958
<li><?php bugfix(70102); ?> (imagecreatefromwebm() shifts colors).</li>
864959
<li><?php bugfix(66590); ?> (imagewebp() doesn't pad to even length).</li>
865960
<li><?php bugfix(66882); ?> (imagerotate by -90 degrees truncates image by 1px).</li>

archive/archive.xml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,17 @@
99
<uri>http://php.net/contact</uri>
1010
<email>[email protected]</email>
1111
</author>
12+
<xi:include href="entries/2016-07-07-1.xml"/>
13+
<xi:include href="entries/2016-06-24-1.xml"/>
14+
<xi:include href="entries/2016-06-23-3.xml"/>
15+
<xi:include href="entries/2016-06-23-2.xml"/>
16+
<xi:include href="entries/2016-06-23-1.xml"/>
17+
<xi:include href="entries/2016-06-15-1.xml"/>
18+
<xi:include href="entries/2016-06-09-1.xml"/>
19+
<xi:include href="entries/2016-06-06-1.xml"/>
20+
<xi:include href="entries/2016-06-03-1.xml"/>
21+
<xi:include href="entries/2016-06-02-1.xml"/>
22+
<xi:include href="entries/2016-05-30-1.xml"/>
1223
<xi:include href="entries/2016-05-26-3.xml"/>
1324
<xi:include href="entries/2016-05-26-2.xml"/>
1425
<xi:include href="entries/2016-05-26-1.xml"/>

archive/entries/2016-05-30-1.xml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom" xmlns:default="http://php.net/ns/news">
3+
<title>The 4th Annual China PHP Conference</title>
4+
<id>http://php.net/archive/2016.php#id2016-05-30-1</id>
5+
<published>2016-05-30T15:53:21+00:00</published>
6+
<updated>2016-05-30T15:53:21+00:00</updated>
7+
<default:finalTeaserDate xmlns="http://php.net/ns/news">2016-06-25</default:finalTeaserDate>
8+
<category term="conferences" label="Conference announcement"/>
9+
<link href="http://php.net/conferences/index.php#id2016-05-30-1" rel="alternate" type="text/html"/>
10+
<default:newsImage xmlns="http://php.net/ns/news" link="http://www.phpconchina.com/"
11+
title="The 4th Annual China PHP Conference">shanghai2016.jpg</default:newsImage>
12+
<link href="http://php.net/archive/2016.php#id2016-05-30-1" rel="via" type="text/html"/>
13+
<content type="xhtml">
14+
<div xmlns="http://www.w3.org/1999/xhtml">
15+
<p>The 4th Annual China PHP Conference – June 25 to 26, Shanghai</p>
16+
17+
<p>We will be hosting a 2-days event filled with high quality, technical sessions about PHP Core, PHP High Performance, PHP Engineering, and PHP more.</p>
18+
19+
<p>Don’t miss out on 2-great days sessions, delicious food, fantastic shows and countless networking opportunities to engage with speakers and delegates.</p>
20+
21+
<p>Go to <a href="http://www.phpconchina.com/">www.phpconchina.com</a> for tickets and more information.</p>
22+
</div>
23+
</content>
24+
</entry>

archive/entries/2016-06-02-1.xml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom" xmlns:default="http://php.net/ns/news">
3+
<title>php[world] 2016 Call for Speakers</title>
4+
<id>http://php.net/archive/2016.php#id2016-06-02-1</id>
5+
<published>2016-06-02T11:36:27-04:00</published>
6+
<updated>2016-06-02T11:36:27-04:00</updated>
7+
<default:finalTeaserDate xmlns="http://php.net/ns/news">2016-06-24</default:finalTeaserDate>
8+
<category term="cfp" label="Call for Papers"/>
9+
<link href="http://php.net/conferences/index.php#id2016-06-02-1" rel="alternate" type="text/html"/>
10+
<default:newsImage xmlns="http://php.net/ns/news" link="https://world.phparch.com/" title="php[world] 2016">phpworld-logo-banner-x-200.png</default:newsImage>
11+
<link href="https://world.phparch.com/" rel="via" type="text/html"/>
12+
<content type="xhtml">
13+
<div xmlns="http://www.w3.org/1999/xhtml">
14+
<p>We are excited to announce that the <a href="https://world.phparch.com/call-for-speakers/">Call for Speakers</a> has opened for <a href="https://world.phparch.com">php[world] 2016</a>.
15+
</p>
16+
<p>Now in its 3rd year, <a href="https://world.phparch.com">php[world]</a> is the conference designed to bring the entire world of PHP together in one place, with dedicated tracks for the biggest applications and frameworks in the PHP community such as WordPress, Drupal, Magento, Joomla!, Symfony, Zend Framework, CakePHP, and Laravel.
17+
</p>
18+
<p>We need to hear from you what you want to speak about though. Talks that fit any of those frameworks or are related to PHP development are all welcome. We offer a comprehensive speakers package to make sure that our presenters aren't put out financially for the event, including:
19+
</p>
20+
<ul>
21+
<li>Airfare coverage ($400 domestic, $1000 international)</li>
22+
<li>Hotel room (1 night + 1 per accepted talk)</li>
23+
<li>Free ticket to the conference</li>
24+
<li>Most meals included!</li>
25+
</ul>
26+
<p>Don't hesitate, our <a href="https://world.phparch.com/call-for-speakers/">Call for Speakers</a> is only open for 3 weeks and closes on June 24th, 2016. So get those submissions in soon, we look forward to <a href="https://world.phparch.com/call-for-speakers/">hearing from you</a>!</p>
27+
</div>
28+
</content>
29+
</entry>

archive/entries/2016-06-03-1.xml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom" xmlns:default="http://php.net/ns/news">
3+
<title>Madison PHP Conference 2016 Call For Papers</title>
4+
<id>http://php.net/archive/2016.php#id2016-06-03-1</id>
5+
<published>2016-06-03T21:05:00-04:00</published>
6+
<updated>2016-06-03T21:05:00-04:00</updated>
7+
<default:finalTeaserDate xmlns="http://php.net/ns/news">2016-06-20</default:finalTeaserDate>
8+
<category term="cfp" label="Call for Papers"/>
9+
<link href="http://php.net/conferences/index.php#id2016-06-03-1" rel="alternate" type="text/html"/>
10+
<default:newsImage xmlns="http://php.net/ns/news" link="http://2016.madisonphpconference.com/" title="Madison PHP Conference 2016">madison-php-2016-conf-logo.png</default:newsImage>
11+
<link href="http://2016.madisonphpconference.com" rel="via" type="text/html"/>
12+
<content type="xhtml">
13+
<div xmlns="http://www.w3.org/1999/xhtml">
14+
<p>We are excited to announce that the <a href="https://cfp.madisonphpconference.com/">Call for Papers</a> has opened for <a href="http://2016.madisonphpconference.com">Madison PHP Conference 2016</a>.
15+
</p>
16+
<p>
17+
Join us on Friday, September 30th, 2016 for a full day of tutorials followed by a three tracks of talks on Saturday, October 1st, 2016. Madison PHP Conference in Madison, Wisconsin focuses on PHP and related web technologies. This event is organized by Madison PHP and is designed to offer something to attendees at all skill levels. It will be two days of networking, learning, sharing, and great fun!
18+
</p>
19+
</div>
20+
</content>
21+
</entry>

archive/entries/2016-06-06-1.xml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
<?xml version="1.0" encoding="utf-8"?>
2+
<entry xmlns="http://www.w3.org/2005/Atom" xmlns:default="http://php.net/ns/news">
3+
<title>DevConf 2016</title>
4+
<id>http://php.net/archive/2016.php#id2016-06-06-1</id>
5+
<published>2016-06-06T09:10:08+00:00</published>
6+
<updated>2016-06-06T09:10:08+00:00</updated>
7+
<default:finalTeaserDate xmlns="http://php.net/ns/news">2016-06-17</default:finalTeaserDate>
8+
<category term="conferences" label="Conference announcement"/>
9+
<link href="http://php.net/conferences/index.php#id2016-06-06-1" rel="alternate" type="text/html"/>
10+
<default:newsImage xmlns="http://php.net/ns/news" link="http://devconf.ru" title="DevConf 2016">devconfru2012.png</default:newsImage>
11+
<link href="http://devconf.ru" rel="via" type="text/html"/>
12+
<content type="xhtml">
13+
<div xmlns="http://www.w3.org/1999/xhtml">
14+
<p>
15+
DevConf 2016 in Moscow, Russia on June 17-18.
16+
</p>
17+
<p>
18+
DevConf is the ultimate meeting place for russian-speaking web-developers,
19+
combining several language-specific conferences under one roof.
20+
This year the conference will take place in <a href="http://devconf.ru/ru/members/location">Skolkovo Moscow School of Management</a>.
21+
</p>
22+
<p>
23+
DevConf 2016 will include the following sections:
24+
</p>
25+
<ul>
26+
<li>DevConf::PHP();</li>
27+
<li>DevConf::Python();</li>
28+
<li>DevConf::Javascript();</li>
29+
<li>DevConf::Storage();</li>
30+
<li>DevConf::Golang();</li>
31+
<li>DevConf::DevOps();</li>
32+
<li>DevConf::Ruby();</li>
33+
</ul>
34+
<p>
35+
Each section will feature several talks from the active contributors/authors of the language.
36+
Among the invited speakers are Dmitry Stogov (Zend), Ekaterina Marshalkina (Drupal), Eduard Medvedev (StackStorm),
37+
Alexander Alekseev (Postgres Professional), Sergey Petrunya (MariaDB), Vasily Soshnikov (Mail.Ru),
38+
Nik Zavarnickiy (LuaJIT), Anton Shramko (Rust), Valentin Bartenev (NGINX) and speakers from Lazada, Oracle and other companies.
39+
See more details on <a href="http://devconf.ru">the official website</a>.
40+
</p>
41+
</div>
42+
</content>
43+
</entry>

0 commit comments

Comments
 (0)