Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:23681 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 5271 invoked by uid 1010); 26 May 2006 02:54:49 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 5256 invoked from network); 26 May 2006 02:54:49 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 May 2006 02:54:49 -0000 X-PHP-List-Original-Sender: iamstever@gmail.com X-Host-Fingerprint: 66.249.92.175 ug-out-1314.google.com Linux 2.4/2.6 Received: from ([66.249.92.175:9487] helo=ug-out-1314.google.com) by pb1.pair.com (ecelerity 2.0 beta r(6323M)) with SMTP id 94/F8-17316-8FD66744 for ; Thu, 25 May 2006 22:54:49 -0400 Received: by ug-out-1314.google.com with SMTP id m2so607086ugc for ; Thu, 25 May 2006 19:54:45 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=twPXWXTKocgmRkinNpiOKrtVFBirt6rj+Vrpy01ZHEF0oeGEl57COx4o4Reb41aZ7z5FlQE050OlSUh7tmbYC+9bJftWOR4f2H+z//OBWOggTlhjoYwxQCsCdjcUdg9LbBk1QBUhLEE2wn7WX4c3ouRsBeKiZI3mrlQCnIWXIZk= Received: by 10.67.89.5 with SMTP id r5mr6080ugl; Thu, 25 May 2006 19:54:45 -0700 (PDT) Received: by 10.67.31.5 with HTTP; Thu, 25 May 2006 19:54:45 -0700 (PDT) Message-ID: <57792e850605251954x5e091fc6td14ae06a9129b1ba@mail.gmail.com> Date: Thu, 25 May 2006 19:54:45 -0700 To: Pierre Cc: internals@lists.php.net In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable Content-Disposition: inline References: <57792e850605251928l18e540b4w53562ca12e733f55@mail.gmail.com> Subject: Re: [PHP-DEV] How critical does a bug need to be to warrant a new PHP release (like 5.1.5)? From: iamstever@gmail.com (steve) What if it requires a PHP script flaw also (like calling a method from an object that doesn't exist)? I can shut down many a site that have 5.1.4 if I can find some input to expose a script flaw like that, if their setup is similar to mine (which I think is common). Damn search engine came across such a bug of mine on a test site and shut it down. Killed a couple others it wasn't searching because of it also. Accidental DOS! Oh the joy... :( Oh well, 5.1.2 works fine for now. On 5/25/06, Pierre wrote: > On 5/26/06, steve wrote: > > How critical does a bug need to be to warrant a new PHP release (like > > 5.1.5)? Are there specific criteria already laid out? > > Security issues or critical bugs (for example segfaults or huge leaks > not managed by the memory manager). Ilia will certainly complete this > list :-) > > --Pierre >