As a user, I wanted to throw my two cents in. Our security administrator _is_ considering this particular fix to be critical, and has made it a required patch. While it's true that this particular fix is protecting against poorly written PHP scripts, it also appears to be the case that such poorly written software is fairly common and is being actively targeted. I also think that with this patch in PHP itself, there will be a lot less pressure for any of the packages which employ unsafe variable handling to actually get fixed. I know that I personally don't have a lot of say on the matter, but it would be nice if the patched version was released sooner. Thanks for your time.

-David Mitchell


--
-----------------------------------------------------------------
| David Mitchell ([EMAIL PROTECTED])       Network Engineer IV  |
| Tel: (303) 497-1845                      National Center for  |
| FAX: (303) 497-1818                      Atmospheric Research |
-----------------------------------------------------------------


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to