Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:18254 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 52137 invoked by uid 1010); 22 Aug 2005 16:04:40 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 52116 invoked from network); 22 Aug 2005 16:04:40 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 22 Aug 2005 16:04:40 -0000 X-Host-Fingerprint: 69.64.38.41 bluga.net Linux 2.5 (sometimes 2.4) (4) Received: from ([69.64.38.41:45861] helo=bluga.net) by pb1.pair.com (ecelerity 2.0 beta r(6323M)) with SMTP id 0C/31-33075-797F9034 for ; Mon, 22 Aug 2005 12:04:39 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by bluga.net (Postfix) with ESMTP id 83DB521C9BA; Mon, 22 Aug 2005 11:04:40 -0500 (CDT) Received: from bluga.net ([127.0.0.1]) by localhost (bluga.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07709-10; Mon, 22 Aug 2005 11:04:40 -0500 (CDT) Received: from [24.208.78.152] (CPE-24-208-78-152.neb.res.rr.com [24.208.78.152]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by bluga.net (Postfix) with ESMTP id 0AEE021C803; Mon, 22 Aug 2005 11:04:39 -0500 (CDT) Message-ID: <4309F791.8040808@php.net> Date: Mon, 22 Aug 2005 11:04:33 -0500 User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Rasmus Lerdorf CC: Sebastian Bergmann , internals@lists.php.net, php-qa@lists.php.net References: <5.1.0.14.2.20050822134257.05e07c60@localhost> <4309F32B.3080102@lerdorf.com> In-Reply-To: <4309F32B.3080102@lerdorf.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Virus-Scanned: by amavisd-new using ClamAV at bluga.net Subject: Re: [PHP-DEV] Re: 5.0.5RC1 rolled From: cellog@php.net (Greg Beaver) Rasmus Lerdorf wrote: > Sebastian Bergmann wrote: > >>Zeev Suraski schrieb: >> >> >>>If there are no stoppers I'd like to release it towards the end of the >>>week. >> >> >> Maybe the bundled PCRE should be updated: >> http://www.securitytracker.com/alerts/2005/Aug/1014744.html > > > Yes, and the whole reason for this release is to stop distributing a > vulnerable version of XML_RPC. The version in the tarball is 1.3.1 and > we want 1.4.0. We didn't update PHP_5_0 with the changes to PEAR 1.3.6, I will probably have time to do this later today, otherwise tomorrow. Greg P.S. if anyone else has the time now, they should simply sync package-PEAR.xml, go-pear-list.php, and XML_RPC-1.4.0.tar from the PHP_5_1 branch and it should be good to go. Don't forget to remove XML_RPC-1.3.1.tar Greg