Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:74890 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 11570 invoked from network); 13 Jun 2014 23:38:31 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 13 Jun 2014 23:38:31 -0000 Authentication-Results: pb1.pair.com smtp.mail=smalyshev@sugarcrm.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=smalyshev@sugarcrm.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain sugarcrm.com designates 67.192.241.113 as permitted sender) X-PHP-List-Original-Sender: smalyshev@sugarcrm.com X-Host-Fingerprint: 67.192.241.113 smtp113.dfw.emailsrvr.com Linux 2.6 Received: from [67.192.241.113] ([67.192.241.113:47547] helo=smtp113.dfw.emailsrvr.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 41/D0-03909-77B8B935 for ; Fri, 13 Jun 2014 19:38:31 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp11.relay.dfw1a.emailsrvr.com (SMTP Server) with ESMTP id B2116D0532 for ; Fri, 13 Jun 2014 19:38:28 -0400 (EDT) X-Virus-Scanned: OK Received: by smtp11.relay.dfw1a.emailsrvr.com (Authenticated sender: smalyshev-AT-sugarcrm.com) with ESMTPSA id 88AE9D0531 for ; Fri, 13 Jun 2014 19:38:28 -0400 (EDT) Message-ID: <539B8B74.6030707@sugarcrm.com> Date: Fri, 13 Jun 2014 16:38:28 -0700 Organization: SugarCRM User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.5.0 MIME-Version: 1.0 To: PHP Internals Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: 5.3 final release From: smalyshev@sugarcrm.com (Stas Malyshev) Hi! As decided in https://wiki.php.net/rfc/php53eol, 5.3 EOL is 1 year after the 5.5.0 release, which is on June 20th. Do we want to make one last release before EOL with latest security patches (probably in sync with 5.4/5.5 releases planned for June 29)? If so, I can scan the logs and backport the recent security-relevant patches. Last 5.3 was half a year ago so we probably have some, even with remote exploit potential. Thanks, -- Stanislav Malyshev, Software Architect SugarCRM: http://www.sugarcrm.com/ (408)454-6900 ext. 227