diff --git a/ChangeLog-5.php b/ChangeLog-5.php
index a6d1af983..94b35fdf9 100644
--- a/ChangeLog-5.php
+++ b/ChangeLog-5.php
@@ -11,6 +11,221 @@ function peclbugl($number) { echo "PHP 5 ChangeLog
+
+
Version 5.4.4
+06-June-2012
+
+- CLI SAPI
+
+ - Implemented FR (Need CLI web-server support for files with .htm & svg extensions)
+ - Improved performance while sending error page, this also fixed bug
+ (Memory leak when access a non-exists file without router)
+ - (functions related to current script failed when chdir() in cli sapi)
+
+
+
+
+- Core
+
+ - Fixed missing bound check in iptcparse()
+ - Fixed CVE-2012-2143
+ - (fix for for bug #54547)
+ - (unexpected behavior when incrementally assigning to a member of a null object)
+ - (Object recursion not detected for classes that implement JsonSerializable)
+ - (long overflow in realpath_cache_get())
+ - (ZTS build doesn't accept zend.script_encoding config)
+ - (incorrect \e processing on Windows)
+ - (__clone/__destruct do not match other methods when checking access controls)
+ - ('Overriding' a private static method with a different signature causes crash)
+ - (Segfault from array_walk modifying an array passed by reference)
+ - (PHP crash when calling ob_start in request_shutdown phase)
+ - (bin2hex(hex2bin($data)) != $data)
+ - (ini parser crashes when using ${xxxx} ini variables (without apache2))
+ - (header_remove() does not remove all headers)
+ - (wrong equality of string numbers)
+ - ([PATH=] sections incompatibility with user_ini.filename set to null)
+ - Changed php://fd to be available only for CLI
+
+
+
+
+- CURL
+
+ - (CURLOPT_COOKIEFILE '' raises open_basedir restriction)
+
+
+
+
+- COM
+
+ - com_dotnet cannot be built shared
+
+
+
+
+- Fileinfo
+
+ - (Uninitialised value used in libmagic)
+
+
+
+
+- FPM
+
+ - (Uninitialised value used in libmagic)
+ - where php_stream_open_wrapper_ex tries to open a directory descriptor under windows
+ - failure caused by the posix lseek and read versions under windows in cdf_read()
+
+
+
+
+
+
+- Intl
+
+ - (Memory corruption in internal function get_icu_disp_value_src_php()
+
+
+
+
+- JSON
+
+ - (json_encode() incorrectly truncates/discards information)
+
+
+
+
+- LibXML
+
+ - (Libxml tests failed(ht is already destroyed))
+
+
+
+
+- PDO
+
+ - (A parsing bug in the prepared statements can lead to access violations)
+
+
+
+
+
+
+- Streams
+
+ - (file_get_contents leaks when access empty file with maxlen set)
+
+
+
+
+- zlib
+
+ - (using ob_gzhandler will complain about headers already sent when no compression)
+ - (can't change zlib.output_compression on the fly)
+ - (zlib.output_compression fails on refresh)
+
+
+
+
+
+Version 5.3.14
+06-June-2012
+
+- CLI SAPI
+
+ - (functions related to current script failed when chdir() in cli sapi)
+
+
+
+
+- Core
+
+ - Fixed CVE-2012-2143
+ - (unexpected behavior when incrementally assigning to a member of a null object)
+ - (Segfault from array_walk modifying an array passed by reference)
+ - Fixed missing bound check in iptcparse()
+ - ('I' unpacks n as signed if n > 2^31-1 on LP64)
+ - ([PATH=] sections incompatibility with user_ini.filename set to null)
+ - (Logic error in charset detection for htmlentities)
+ - (long overflow in realpath_cache_get())
+ - Changed php://fd to be available only for CLI.
+
+
+
+
+- CURL
+
+ - (CURLOPT_COOKIEFILE '' raises open_basedir restriction)
+
+
+
+
+- COM
+
+ - com_dotnet cannot be built shared
+
+
+
+
+- Fileinfo
+
+ - (Uninitialised value used in libmagic)
+
+
+
+
+
+
+- Intl
+
+ - (Memory corruption in internal function get_icu_disp_value_src_php()
+
+
+
+
+- JSON
+
+ - (json_encode() incorrectly truncates/discards information)
+
+
+
+
+- PDO
+
+ - (A parsing bug in the prepared statements can lead to access violations)
+
+
+
+
+
+
+- Streams
+
+ - (file_get_contents leaks when access empty file with maxlen set)
+
+
+
+
Version 5.4.3
08-May-2012
diff --git a/include/releases.inc b/include/releases.inc
index 2ec4f91c0..30d0d15d7 100644
--- a/include/releases.inc
+++ b/include/releases.inc
@@ -2,6 +2,32 @@
$OLDRELEASES = array (
5 =>
array (
+ '5.4.3' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/5_4_3.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-5.4.3.tar.bz2',
+ 'name' => 'PHP 5.4.3 (tar.bz2)',
+ 'md5' => '51f9488bf8682399b802c48656315cac',
+ 'date' => '08 May 2012',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-5.4.3.tar.gz',
+ 'name' => 'PHP 5.4.3 (tar.gz)',
+ 'md5' => 'c9dccc89cc89d39e84f6e6f0cf1c8a65',
+ 'date' => '08 May 2012',
+ ),
+ ),
+ 'date' => '08 May 2012',
+ 'museum' => false,
+ ),
'5.4.2' =>
array (
'announcement' =>
@@ -80,6 +106,32 @@ $OLDRELEASES = array (
'date' => '01 March 2012',
'museum' => false,
),
+ '5.3.13' =>
+ array (
+ 'announcement' =>
+ array (
+ 'English' => '/releases/5_3_13.php',
+ ),
+ 'source' =>
+ array (
+ 0 =>
+ array (
+ 'filename' => 'php-5.3.13.tar.bz2',
+ 'name' => 'PHP 5.3.13 (tar.bz2)',
+ 'md5' => '370be99c5cdc2e756c82c44d774933c8',
+ 'date' => '08 May 2012',
+ ),
+ 1 =>
+ array (
+ 'filename' => 'php-5.3.13.tar.gz',
+ 'name' => 'PHP 5.3.13 (tar.gz)',
+ 'md5' => '179c67ce347680f468edbfc3c425476a',
+ 'date' => '08 May 2012',
+ ),
+ ),
+ 'date' => '08 May 2012',
+ 'museum' => false,
+ ),
'5.3.12' =>
array (
'announcement' =>
diff --git a/include/version.inc b/include/version.inc
index 9653b18fb..78aabe962 100644
--- a/include/version.inc
+++ b/include/version.inc
@@ -17,27 +17,27 @@
*/
/* PHP 5.4 Release */
-$PHP_5_4_RC = '5.4.4RC2'; // set to false when there is no RC
+$PHP_5_4_RC = false; // set to false when there is no RC
$PHP_5_4_RC_DATE = "30 May 2012";
-$PHP_5_4_VERSION = "5.4.3";
-$PHP_5_4_DATE = "08 May 2012";
+$PHP_5_4_VERSION = "5.4.4";
+$PHP_5_4_DATE = "14 June 2012";
$PHP_5_4_MD5 = array(
- "tar.bz2" => "51f9488bf8682399b802c48656315cac",
- "tar.gz" => "c9dccc89cc89d39e84f6e6f0cf1c8a65",
+ "tar.bz2" => "1fd98dc3f6f3805cd67bff12a26ed77f",
+ "tar.gz" => "8366c3626f2275ab8c7ef5e2d6bc5bd7",
);
/* PHP 5.3 Release */
-$PHP_5_3_RC = '5.3.14RC1';
+$PHP_5_3_RC = false;
$PHP_5_3_RC_DATE = '17 May 2012';
-$PHP_5_3_VERSION = "5.3.13";
-$PHP_5_3_DATE = "08 May 2012";
+$PHP_5_3_VERSION = "5.3.14";
+$PHP_5_3_DATE = "14 June 2012";
$PHP_5_3_MD5 = array(
- "tar.bz2" => "370be99c5cdc2e756c82c44d774933c8",
- "tar.gz" => "179c67ce347680f468edbfc3c425476a",
+ "tar.bz2" => "7caac4f71e2f21426c11ac153e538392",
+ "tar.gz" => "148730865242a031a638ee3bab4a9d4d",
);
$RELEASES = array(
diff --git a/releases/5_3_14.php b/releases/5_3_14.php
new file mode 100644
index 000000000..1135d31be
--- /dev/null
+++ b/releases/5_3_14.php
@@ -0,0 +1,24 @@
+
+
+PHP 5.3.14 Release Announcement
+
+The PHP development team would like to announce the immediate
+availability of PHP 5.3.14. This release fixes two security related
+issues. All users of PHP 5.3 are encouraged to upgrade to this release.
+
+PHP 5.3.14 fixes an security issue in the implementation of crypt() and a
+heap overflow in the Phar extension. Over 30 bugs were fixed
+
+Please note that php://fd is now only available if the CLI SAPI is used
+
+For source downloads of PHP 5.3.14 please visit our downloads page,
+Windows binaries can be found on windows.php.net/download/.
+The list of changes is recorded in the ChangeLog.
+
+
+
diff --git a/releases/5_4_4.php b/releases/5_4_4.php
new file mode 100644
index 000000000..296ac86eb
--- /dev/null
+++ b/releases/5_4_4.php
@@ -0,0 +1,24 @@
+
+
+PHP 5.4.4 Release Announcement
+
+The PHP development team would like to announce the immediate
+availability of PHP 5.4.4. This release fixes two security related
+issues. All users of PHP are encouraged to upgrade to this release.
+
+PHP 5.4.4 fixes an security issue in the implementation of crypt() and a
+heap overflow in the Phar extension. Over 30 bugs were fixed
+
+Please note that php://fd is now only available if the CLI SAPI is used
+
+For source downloads of PHP 5.4.4 please visit our downloads page,
+Windows binaries can be found on windows.php.net/download/.
+The list of changes is recorded in the ChangeLog.
+
+
+