hi,


On Mon, Aug 22, 2011 at 9:51 PM, Ondřej Surý <ond...@sury.org> wrote:
> Hi,
>
> I wrote this patch sometime ago and Debian package uses it:
>
> https://bugs.php.net/bug.php?id=51254
>
> which in turn made Debian packages not-vulnerable to #55439.


That's a bit easy to come up with that, I don't think either that we
should explain again why what was done with 5.3.7-final was wrong in
all possible ways and why we are all responsible for this mistake :)

> (But I
> have failed too, I should really start to check to output of the tests
> when building the package and compare them for any regressions.)

:)

> So I will (ab)use this time and ask for a feedback (again). I only
> received this from Pierre:
>
>> Not sure I agree with these changes, they are not supposed to be valid. I 
>> don't have the time now to reply with a detailed explanation but we will do 
>> it asap.
>
> and the detailed explanation never came.
>
> What the patch does:
> - it changes the m4 script to check for each individual cipher and if
> found it will use the system library for found ciphers, it will use
> PHP implementation for the rest (not-found)

In 5.4+ it should be fine to apply it as long as it is well tested
(and not only on Debian pls :), MFH once 100% tested (other esoteric
systems), incl. phpt passing everywhere. Then main problem here is
about systems doing weird or non standard things. Debian does or did
that for a couple of things, I prefer true portability.

Cheers,
-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to