Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:118813 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 27205 invoked from network); 14 Oct 2022 13:44:38 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 14 Oct 2022 13:44:38 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 80C9E1804A7 for ; Fri, 14 Oct 2022 06:44:37 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS24940 176.9.0.0/16 X-Spam-Virus: No X-Envelope-From: Received: from chrono.xqk7.com (chrono.xqk7.com [176.9.45.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Fri, 14 Oct 2022 06:44:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bastelstu.be; s=mail20171119; t=1665755074; bh=KlocvxazjTUlX37nbUr8dqAhr8aeIOvMUsZ6tJvd8rQ=; h=Date:To:From:Subject:From; b=Fj6yLot9JaeR9ig/2jLg1mV7d4B9zoLQf6cKuv4GoHkiFpDVFOmLxJNZrViNzG8HZ +1vmCO1IIvo/fpH4jK9bUE85WcU846EurAZ/eRcCkveWenaVA30npnCYRDlbMQAl5g ZyIvI8np3yiNpVeJjh4jGw7F5u8gSeb2XO8itsffrD8Ep7xpup4nvZOywZUQ9A4was yP+QDDijq89SCqNmyBhvbGyMKYKGDiK/6jauMAWw6x3KmHy7cX3k5yXKIayMcmop0c vhzBOHUcUdp93QOwnMc5im5Vvw0QOF2DZkaAr95JOMamIycQNf/tnvhN0otBxCEzMU ekWk4fSUwkiwQ== Message-ID: <22177032-fe72-c39b-63fe-fa4368a70852@bastelstu.be> Date: Fri, 14 Oct 2022 15:44:32 +0200 MIME-Version: 1.0 Content-Language: en-US To: PHP internals Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Subject: [VOTE] Improve unserialize() error handling From: tim@bastelstu.be (=?UTF-8?Q?Tim_D=c3=bcsterhus?=) Hi as announced on Wednesday [1] I've now opened the vote for: "Improve unserialize() error handling" [2] The RFC contains three votes, each of which requires a 2/3 majority. Two of the votes are for 8.x (8.3), one for 9.0. Voting will run 2 weeks until: 2022-10-28 at 14:00 UTC -------- Please find the below resources for your reference: RFC: https://wiki.php.net/rfc/improve_unserialize_error_handling PoC implementation: - https://github.com/php/php-src/pull/9425 - https://github.com/php/php-src/pull/9629 Discussion Thread: https://externals.io/message/118566 Related Thread: https://externals.io/message/118311 -------- [1] https://externals.io/message/118566#118807 [2] https://wiki.php.net/rfc/improve_unserialize_error_handling Best regards Tim Düsterhus