Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:130577 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by lists.php.net (Postfix) with ESMTPS id 6C1AB1A00BC for ; Sun, 5 Apr 2026 12:15:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1775391350; bh=oW8LOJ6W2apnU8iM7uixm3O1mZgO9qGbVAq1Zfzh2OQ=; h=Date:To:From:Subject:In-Reply-To:References:From; b=km+nVszq67WFBVQhBrCuQN4lXR2tafQRq06iUzZN5nOW3Fh1e73ylxIY8Ao51ahby PuL8x6jIBg6hGISYi+4Wa3O7wkqQ15oqk2njogq8k7aRUEQjasNdr6Jqa2GlggQpnn Gi2V93UT8cGy6HuvqbBjfW88o2ikXdqEEaz+lJsm/TFrvbZHFccy2tYG14N/378Lxf CI4XmLNoQO05xdON5Ycs7y1EpE6p7eMd5Pi6bGjxCslSEQJOucQCL66a0BQpynDhv+ ZX47js6qSHySIF5fCyBLSiDoSXf+Wmq4uNy4rWiE6Z+5cBaB4UAtDfKbT/hMfQJKd+ MYNko+eluWZiQ== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id C48801801E3 for ; Sun, 5 Apr 2026 12:15:48 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-25) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.1 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS autolearn=no autolearn_force=no version=4.0.1 X-Spam-Virus: No X-Envelope-From: Received: from mail-4397.protonmail.ch (mail-4397.protonmail.ch [185.70.43.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 5 Apr 2026 12:15:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gpb.moe; s=protonmail2; t=1775391330; x=1775650530; bh=oW8LOJ6W2apnU8iM7uixm3O1mZgO9qGbVAq1Zfzh2OQ=; h=Date:To:From:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=UcQa6NhrqceMd100bBaMISyO/a4FxsxWr7dUDP8IbbQK7v8Lnmka60u0uPCoNa9Re HGR4Wre8XEaOnxsxcGy5EfyNhHaJIeEjGViyYGg2CuXR6F9XCUIJVJ1WTKtUaVg0a3 W1gkyTs/4DJDQxuTeMEi1BITdU2n4PJsGXPjWQFrA/X0pucIadNlkbsvLOK5pw+Vtp 9XxAoze5HxORTnvI14Ul5Ls7ladiSWr3FT8ltArkka92ksbFGCfREefCadQ93XgY80 dTC3BP4a2Se7532hrQYbx+zaba7GFLxR83hLH4t1sg8IHQHjQYl+r1Kn8HSDXEFria b6k1DCDblvAwQ== Date: Sun, 05 Apr 2026 12:15:26 +0000 To: PHP internals Subject: [PHP-DEV] Re: [RFC] [VOTE] Exempt input type and value validation from BC Break policy Message-ID: In-Reply-To: References: Feedback-ID: 96993444:user:proton X-Pm-Message-ID: 29e8acb30eabe947eb7c101dfb27e915c0af765c Precedence: list list-help: list-unsubscribe: list-post: List-Id: x-ms-reactions: disallow MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable From: internals@gpb.moe ("Gina P. Banyard") On Saturday, 21 March 2026 at 11:22, Gina P. Banyard wr= ote: > Hello internals, >=20 > With a small delay due to unexpected circumstances I've started the vote = on the "Exempt input type and value validation from BC Break policy" policy= RFC. > It will run from today the 2026-03-21 until the 2026-04-04 at 12:00 UTC. >=20 > The RFC can be found at the following link: https://wiki.php.net/rfc/poli= cy-exempt-type-value-error-bc-policy The RFC has been accepted with 26 votes in favour, 5 against, and 3 abstent= ions. It has passed the 2/3 majority threshold with 84% of yes votes. Best regards, Gina P. Banyard