Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:23682 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 8173 invoked by uid 1010); 26 May 2006 03:06:13 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 8158 invoked from network); 26 May 2006 03:06:13 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 May 2006 03:06:13 -0000 X-PHP-List-Original-Sender: jasper@album.co.nz X-Host-Fingerprint: 210.55.31.88 mail.album.co.nz Linux 2.5 (sometimes 2.4) (4) Received: from ([210.55.31.88:48724] helo=mail.album.co.nz) by pb1.pair.com (ecelerity 2.0 beta r(6323M)) with SMTP id 47/39-17316-3A076744 for ; Thu, 25 May 2006 23:06:12 -0400 Received: from mail.album.co.nz (www.album.co.nz [127.0.0.1]) by mail.album.co.nz (Postfix) with ESMTP id 54F1110A4F2; Fri, 26 May 2006 15:06:04 +1200 (NZST) X-Spam-Checker-Version: SpamAssassin 3.1.1-gr0 (2006-03-10) on www.album.co.nz X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=unavailable version=3.1.1-gr0 Received: from [192.168.225.244] (gate1.digiweb.net.nz [202.174.112.3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.album.co.nz (Postfix) with ESMTP id 0124CB1F2D; Fri, 26 May 2006 15:06:03 +1200 (NZST) Message-ID: <44767083.7000206@album.co.nz> Date: Fri, 26 May 2006 15:05:39 +1200 Organization: Album Limited User-Agent: Thunderbird 1.5.0.2 (X11/20060522) MIME-Version: 1.0 To: steve CC: Pierre , internals@lists.php.net References: <57792e850605251928l18e540b4w53562ca12e733f55@mail.gmail.com> <57792e850605251954x5e091fc6td14ae06a9129b1ba@mail.gmail.com> In-Reply-To: <57792e850605251954x5e091fc6td14ae06a9129b1ba@mail.gmail.com> X-Enigmail-Version: 0.94.0.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] How critical does a bug need to be to warrant a new PHP release (like 5.1.5)? From: jasper@album.co.nz (Jasper Bryant-Greene) -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Would you care to elaborate? Maybe a sample script that exhibits this behaviour? Jasper steve wrote: > What if it requires a PHP script flaw also (like calling a method from > an object that doesn't exist)? I can shut down many a site that have > 5.1.4 if I can find some input to expose a script flaw like that, if > their setup is similar to mine (which I think is common). Damn search > engine came across such a bug of mine on a test site and shut it down. > Killed a couple others it wasn't searching because of it also. > Accidental DOS! Oh the joy... > > :( > > Oh well, 5.1.2 works fine for now. > > On 5/25/06, Pierre wrote: >> On 5/26/06, steve wrote: >> > How critical does a bug need to be to warrant a new PHP release (like >> > 5.1.5)? Are there specific criteria already laid out? >> >> Security issues or critical bugs (for example segfaults or huge leaks >> not managed by the memory manager). Ilia will certainly complete this >> list :-) >> >> --Pierre >> > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFEdnCDFfAeHhDzT4gRA4iqAKCQFanzjvSiF2+k+ChCc9Dj6m9N5ACgkLDS ICdJtzKh99zrdnR/PYwgK+A= =ocva -----END PGP SIGNATURE-----