I know everyone is aware of the xml_rpc exploit by now. Because of the many recent changes in PEAR, many of you may not have an updated version of XML_RPC in your current working PEAR, even if you did as the GLSA suggests.
Please make sure you are updated by running the following command. # pear upgrade XML_RPC Also, some php applications include their own PEAR libs, in this case, you will want to overwrite the XML directory and XML.php with a current version. Stuart has said this patch has caused some breakage in certain apps. I'm not certain of the details, but be sure to check all the functionality of your apps. Wendall -- [email protected] mailing list
