Newsgroups: php.general,php.internals Path: news.php.net Xref: news.php.net php.general:324140 php.internals:79818 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 32345 invoked from network); 19 Dec 2014 15:43:37 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 19 Dec 2014 15:43:37 -0000 Authentication-Results: pb1.pair.com header.from=adjptwm@yahoo.de; sender-id=unknown; domainkeys=good Authentication-Results: pb1.pair.com smtp.mail=adjptwm@yahoo.de; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain yahoo.de from 212.82.97.87 cause and error) DomainKey-Status: good X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: adjptwm@yahoo.de X-Host-Fingerprint: 212.82.97.87 nm30-vm9.bullet.mail.ir2.yahoo.com Received: from [212.82.97.87] ([212.82.97.87:49206] helo=nm30-vm9.bullet.mail.ir2.yahoo.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AB/51-22885-8A744945 for ; Fri, 19 Dec 2014 10:43:36 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.de; s=s2048; t=1419003810; bh=X+gEgXHGeVKSxVd0QpqXRqFem2gkb84x5x/JCCCJmWY=; h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject; b=LoOKPqXWQvDLoBVplIrFbwH4C0KMx53lsP350WzKREWTRaJ4sSASfWwS4xDf/P1TxU2nzVKYKf4tIP2hTtNvta2Vvpo7oK2pdmkPsbD6TDdzDI9aXY3/HQ2zuBfNMpveVUkmO1E5gM6tr7SjUX1jMcXANmASgFgwEblpLGIAL8xBMWNMiUTg/6B5bDjMwQHP58C3QPczaGBgmavL0KsEkc9ptL7S+O+pQUJCtWQAFfX86jiYUesaMzUl6FYiKafnYaog/ZpZlB7+asBRjXJDembAHg284QDg8PJnj7UM0dDZQfG79djR2azFlmr3t5s2l2aC/xWq3jItQ7njYmV8Ng== DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s2048; d=yahoo.de; b=Pv9vjhQshtzszLkrjzpmlgtFSti1NONb889kcDqCD+IjsGMh62aM9FcMeAe3H5lHB9i4FtflyeXXpLs/cuoXBFgM0yu/c8OMbfAvdiEE/2QVMnmocYrptPzyiYTbQNraIBxizqqglEJgl86MEg+nS0Fi9TmadACbC2GHIyHL7IdjYRdZrW3YzHvstbXuT89IbWczbXBzf7KkkeePSvBC6g0LqCM6Cbfc47/Z7Rgyal8SNKkBzKTvufvBAnoPCx/m6z5OL/yx6c2AnvnE4sCe56UWE+XNUJQlxk4IBAYlndi67JDcSuYdNIu3kgO2S5P5I9q8hvPwEK3vQglmQrxgCw==; Received: from [212.82.98.48] by nm30.bullet.mail.ir2.yahoo.com with NNFMP; 19 Dec 2014 15:43:30 -0000 Received: from [212.82.98.70] by tm1.bullet.mail.ir2.yahoo.com with NNFMP; 19 Dec 2014 15:43:30 -0000 Received: from [127.0.0.1] by omp1007.mail.ir2.yahoo.com with NNFMP; 19 Dec 2014 15:43:30 -0000 X-Yahoo-Newman-Property: ymail-5 X-Yahoo-Newman-Id: 879853.64301.bm@omp1007.mail.ir2.yahoo.com X-YMail-OSG: LAqPvNQVM1mJeg6RE0zd41_g3jBq3eDwVCz5PEYahKfbaspR7SfNnyaNW1MEoIZ 7PD2GnwCeh27smnwL39urJ3Mmo6P2uncTf4UpbUPyHwesdr2dQlxByw2H6oCbxOJPS5YB1lhOPZ0 BvW2fMoah1gQcaAu4O6NRQFEgMvPiFTiqVlvXfjd81.m0ZOlPUd9WRYXds8fZfzu1d5HBHTVYC8y KgdnEt5GZ8dcD6L9QNrTsyeFwNsJWvYGIpBFCl.e2ZAVFZWy_Hf6aqkIgOSxpBGleYEpzh4j2x8r uK0zSdd.feldOE099HjalXWV.8t5uYtKbsXPL.ixQlGlvtWXIjtlOHtDWgBCGsz.bpbrb30vSxug hMXLIpIV6dbXM9nwnBhAaeRi7NFZe1Kg1HkRtqc2k2di9QMI7IOSJJRMb8Jct.pRFTHj_ZQqEkDa q.Hf.psXhA_4a.sG3rjZGJX39jJo4ddwa8Aepe9zQ7AP1AeSvo6kpnks_S3K60R.i6EAgAmVLk_s MtwVGqRRl4MqXt2i0Ukb4oumI4UKngGlEo45pTeH0dDqr.cccVwEZ Received: by 212.82.98.118; Fri, 19 Dec 2014 15:43:30 +0000 Date: Fri, 19 Dec 2014 15:43:29 +0000 (UTC) Reply-To: adjptwm To: Stanislav Malyshev , "php-announce@lists.php.net" , PHP Internals , "php-general@lists.php.net" Message-ID: <959956947.793361.1419003809825.JavaMail.yahoo@jws11154.mail.ir2.yahoo.com> In-Reply-To: <5493F398.9070405@gmail.com> References: <5493F398.9070405@gmail.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_793360_981940968.1419003809822" Subject: Re: [ANNOUNCE] PHP 5.4.36 Released From: adjptwm@yahoo.de (adjptwm) ------=_Part_793360_981940968.1419003809822 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Von: Stanislav Malyshev An: php-announce@lists.php.net; PHP Internals ; php-general@lists.php.net Gesendet: 10:44 Freitag, 19.Dezember 2014 Betreff: [ANNOUNCE] PHP 5.4.36 Released Hello! The PHP development team announces the immediate availability of PHP 5.4.36. Two security-related bugs were fixed in this release, including the fix for CVE-2014-8142. All PHP 5.4 users are encouraged to upgrade to this version. For source downloads of PHP 5.4.36 please visit our downloads page: http://www.php.net/downloads.php Windows binaries can be found on http://windows.php.net/download/ The list of changes is recorded in the ChangeLog: http://www.php.net/ChangeLog-5.php#5.4.36 Stanislav Malyshev PHP 5.4 RM -- PHP Announcements Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php ------=_Part_793360_981940968.1419003809822--