I know everyone is aware of the xml_rpc exploit by now. Because of the
many recent changes in PEAR, many of you may not have an updated version
of XML_RPC in your current working PEAR, even if you did as the GLSA
suggests.

Please make sure you are updated by running the following command.

# pear upgrade XML_RPC

Also, some php applications include their own PEAR libs, in this case,
you will want to overwrite the XML directory and XML.php with a current
version.

Stuart has said this patch has caused some breakage in certain apps. I'm
not certain of the details, but be sure to check all the functionality
of your apps.

Wendall

-- 
[email protected] mailing list

Reply via email to