[ANNOUNCE] Proposed 5.1 Release Announcement

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The PHP development team is proud to announce the release of PHP 5.1.
Some of the key features of PHP 5.1 include:

* A complete rewrite of date handling code, with improved timezone support.
* Significant performance improvements compared to PHP 5.0.X.
* PDO extension is now enabled by default.
* Over 30 new functions in various extensions and built-in functionality.
* Bundled libraries, PCRE and SQLite upgraded to latest versions.
* Over 400 various bug fixes.
* PEAR upgraded to version 1.4.5

The full details of the changes in PHP 5.1.0 can be found here:
http://www.php.net/ChangeLog-5.php#5.1.0

In addition to new features, this release includes a number of important
security fixes:

* Fixed a Cross Site Scripting (XSS) vulnerability in phpinfo() that
could lead f.e. to cookie exposure, when a phpinfo() script is
accidentally left on a production server.
* Fixed multiple safe_mode/open_basedir bypass vulnerabilities in
ext/curl and ext/gd that could lead to exposure of files normally not
accessible due to safe_mode or open_basedir restrictions.
* Fixed a possible $GLOBALS overwrite problem in file upload handling,
extract() and import_request_variables() that could lead to unexpected
security holes in scripts assumed secure. (For more information, see here).
* Fixed a problem when a request was terminated due to memory_limit
constraints during certain parse_str() calls. In some cases this can
result in register_globals being turned on.
* Fixed an issue with trailing slashes in allowed basedirs. They were
ignored by open_basedir checks, so that specified basedirs were handled
as prefixes and not as full directory names.
* Fixed an issue with calling virtual() on Apache 2. This allowed
bypassing of certain configuration directives like safe_mode or
open_basedir.
* Updated to the latest pcrelib to fix a possible integer overflow
vulnerability announced in CAN-2005-2491.
* Possible header injection in mb_send_mail() function via the “To”
address, the first parameter of the function.

All users of PHP 5.0 and early adopters of 5.1 betas are strongly
advised to upgrade to 5.1 as soon as possible. An upgrade is available
at http://www.php.net/README_UPGRADE_51.php.

Enjoy,

PHP Development Team.

-- 
PHP Announcements Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux