Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72691 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 20984 invoked from network); 18 Feb 2014 19:43:34 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 18 Feb 2014 19:43:34 -0000 Authentication-Results: pb1.pair.com header.from=tjerk.meesters@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=tjerk.meesters@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.128.179 as permitted sender) X-PHP-List-Original-Sender: tjerk.meesters@gmail.com X-Host-Fingerprint: 209.85.128.179 mail-ve0-f179.google.com Received: from [209.85.128.179] ([209.85.128.179:56037] helo=mail-ve0-f179.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 12/28-16937-5E7B3035 for ; Tue, 18 Feb 2014 14:43:34 -0500 Received: by mail-ve0-f179.google.com with SMTP id jx11so14218938veb.10 for ; Tue, 18 Feb 2014 11:43:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=sCPXNVoqRDnt9/Kjrtt2OqLzzSPCxE0AESJ5HGW/pDg=; b=xALZdbRFcdGy02nQuUtU/juEpY1ECZHIJOh9d460g/3k0caRmAuODaNttpykCbOB6I BuWdsUzX+KK5+OFMjJ90NzMNt9PCZT7abB3IQ9b77qjWGsuOHmSFg1liqpJUWakCKp6u dBnkf5Hvw53kpDwK/S+5oyFDVKD8HIFD3IDqYjViMHpEVbnm8D0uhwcxgMM5JfNyZdZs rMl825/uVKtQpfyxWfu169afSQzHHSO/+2Y0bmHK1FrilBsc/KtAzP+1DssTfYBO5Pee Qc85Zeaqbrzv0XWThfSmq9IFpdHzm5XUzz3PVjmp9ADCL8a+FBdqzVbq1uWaUMHyhara 2OFw== MIME-Version: 1.0 X-Received: by 10.53.0.230 with SMTP id bb6mr5807111vdd.39.1392752609762; Tue, 18 Feb 2014 11:43:29 -0800 (PST) Received: by 10.58.133.229 with HTTP; Tue, 18 Feb 2014 11:43:29 -0800 (PST) Date: Wed, 19 Feb 2014 03:43:29 +0800 Message-ID: To: PHP Internals Content-Type: multipart/alternative; boundary=001a1133f56e90a31604f2b37c9a Subject: Re: private bug reports From: tjerk.meesters@gmail.com (Tjerk Meesters) --001a1133f56e90a31604f2b37c9a Content-Type: text/plain; charset=ISO-8859-1 Hi, I was recently answering a question about null byte injection into PCRE and the OP claimed that a pattern such as "~.+~e\x00u" would be accepted; they were using 5.3. The commit that fixed it was this: https://github.com/php/php-src/commit/8b3c1a380a182655113b94b0b96551e98d05a8d3 The corresponding (private) bug is: https://bugs.php.net/bug.php?id=55856 My question is whether there's a defined "time out period" after which those kind of sensitive bug reports are opened to the public; is it done once we hit EOL for that branch? -- -- Tjerk --001a1133f56e90a31604f2b37c9a--