Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:19876 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 25093 invoked by uid 1010); 1 Nov 2005 08:52:49 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 25078 invoked from network); 1 Nov 2005 08:52:49 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 1 Nov 2005 08:52:49 -0000 X-Host-Fingerprint: 62.116.172.149 mail.city-map.de Linux 2.6 Received: from ([62.116.172.149:35392] helo=mail.city-map.de) by pb1.pair.com (ecelerity 2.0 beta r(6323M)) with SMTP id 5E/0C-02082-0EC27634 for ; Tue, 01 Nov 2005 03:52:49 -0500 Received: from mail.topconcepts.net by mail.city-map.de ([62.116.172.149]:25) with [XMail 1.22 ESMTP Server] id for from ; Tue, 1 Nov 2005 09:52:41 +0100 Received: from eagle by mail.topconcepts.net with [XMail 1.22 ESMTP Server] id for from ; Tue, 1 Nov 2005 09:52:41 +0100 To: "'Derick Rethans'" , "'PHP Developers Mailing List'" Date: Tue, 1 Nov 2005 09:52:36 +0100 Message-ID: <018401c5dec1$9b7e0970$9a00a8c0@stade.topconcepts.net> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook 11 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 In-Reply-To: Thread-Index: AcXeIVyshxH01bPNRiGKYjY/oYcy/wAn6Lng Subject: RE: [PHP-DEV] PHP 4.4.1 has been released From: ruempler@topconcepts.com (=?us-ascii?Q?Sonke_Ruempler?=) References: Hi, Derick Rethans wrote on Monday, October 31, 2005 2:43 PM: > PHP 4.4.1 is now available for download [1]. This version is a > maintenance release, that contains numerous bug fixes, including a > number of security fixes related to the overwriting of the GLOBALS > array. All users of PHP 4.3 and 4.4 are encouraged to upgrade to this > version. I guess the release of PHP 5.0.6 isn't far away. Simple question: Will 5.0.6 give us back BC for the "pass-by-ref-fix" of 5.0.5, something like throwing a warning (was discussed here). If not we have the problem that now PHP 5.0.4 is unsecure and the new versions won't work without extremly testing of some bigger applications. Thank you and best regrards.