Newsgroups: php.general,php.internals,php.announce Path: news.php.net Xref: news.php.net php.general:323551 php.internals:75107 php.announce:121 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 41632 invoked from network); 27 Jun 2014 04:12:51 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 27 Jun 2014 04:12:51 -0000 Authentication-Results: pb1.pair.com header.from=smalyshev@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=smalyshev@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.160.42 as permitted sender) X-PHP-List-Original-Sender: smalyshev@gmail.com X-Host-Fingerprint: 209.85.160.42 mail-pb0-f42.google.com Received: from [209.85.160.42] ([209.85.160.42:47965] helo=mail-pb0-f42.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id B3/91-11209-14FECA35 for ; Fri, 27 Jun 2014 00:12:50 -0400 Received: by mail-pb0-f42.google.com with SMTP id ma3so4032948pbc.15 for ; Thu, 26 Jun 2014 21:12:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=V1haVe1q873eE5pkW5KO5rzlnEXnlAYlEESKuo4eCxc=; b=UV778OkevDKm7XGWrck8koNwmHr4wLPs9x6avRMRIH0f5Xm/NIKHJw/QEWTR7rkak9 fF8jUyWwaQxKiM0pW2oRmRtRsM4yd4vy6Fr+btB1GJvXv1f11OgxBHAjjPo+WbxsLLiN zblcBwasQt2ymfWm4G7GZZQORx35Jq2LYVM19Ue61dt1zIhqIiOY5M2EBRQMDSBna7QN r0xCEqaEfOj97iwva+mHElCafMnc0Bfmd9d4Ki9bk0+Yd2ylkLRNVlUR1ifSuGUDE4VK +dh/GliP8R2PbMwgY1cDqfAMePIRkJyQp76JApRDHdCK4nA9D+kN3SDZOEsQ9h2zJMHW qrOA== X-Received: by 10.68.181.67 with SMTP id du3mr27462279pbc.96.1403842366207; Thu, 26 Jun 2014 21:12:46 -0700 (PDT) Received: from Stass-MacBook-Pro.local (108-66-6-48.lightspeed.sntcca.sbcglobal.net. [108.66.6.48]) by mx.google.com with ESMTPSA id js3sm12389786pbb.50.2014.06.26.21.12.44 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 26 Jun 2014 21:12:45 -0700 (PDT) Message-ID: <53ACEF3B.3090902@gmail.com> Date: Thu, 26 Jun 2014 21:12:43 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.6.0 MIME-Version: 1.0 To: "php-general@lists.php.net" , PHP Internals , php-announce@lists.php.net Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: PHP 5.4.30 Released From: smalyshev@gmail.com (Stas Malyshev) Hello! The PHP development team announces the immediate availability of PHP 5.4.30. Over 20 bugs were fixed in this release, including the following security issues: CVE-2014-3981, CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-4049, CVE-2014-3515. All PHP 5.4 users are encouraged to upgrade to this version. Please, note that this release also fixes a backward compatibility issue that has been detected in the PHP 5.4.29 release. Still, the fix in PHP 5.4.30 may break some very rare situations. As this tiny compatibility break involves security, and as security is our primary concern, we had to fix it. This concerns bug 67072. For more information about this bug and its actual resolution, please refer to our upgrading guide, section 4a: http://git.php.net/?p=php-src.git;a=blob_plain;f=UPGRADING;hb=refs/heads/PHP-5.4 We apologize for any inconvenience you may have experienced with this behavior. For source downloads of PHP 5.4.30 please visit our downloads page: http://www.php.net/downloads.php Windows binaries can be found on http://windows.php.net/download/ The full list of changes is recorded in the ChangeLog: http://www.php.net/ChangeLog-5.php#5.4.30 Stanislav Malyshev PHP 5.4 RM