Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <200910121057.04097.oeriksson@mandriva.com>
Date: Mon, 12 Oct 2009 10:57:03 +0200
From: Oden Eriksson <oeriksson@...driva.com>
To: oss-security@...ts.openwall.com
Subject: presumptive php sec holes

Hello.

Attached are some php patches that to me looks security related (unknown 
impact). I hope someone with insight can classify and possible assign CVE 
numbers. The patches were taken from their svn repo, so it's "official".

Cheers.
-- 
Regards // Oden Eriksson

View attachment "php-5.3.x-safe_mode_bypass_fix.diff" of type "text/x-patch" (444 bytes)

View attachment "php-5.2.x-safe_mode_bypass_fix.diff" of type "text/x-patch" (516 bytes)

View attachment "php-5.2.x-open_basedir_bypass_fix.diff" of type "text/x-patch" (510 bytes)

View attachment "php-5.3.x-open_basedir_bypass_fix.diff" of type "text/x-patch" (511 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.