There doesn't seem to be a list or address to report things like this 
directly to Mandrake.  I'm posting this here in the hopes that one of the 
Mandrake employees on the list will forward it to the appropriate people 
within the company.

http://security.e-matters.de/advisories/012002.html is the actual 
announcement of the problem.  The version of PHP that I've last gotten from 
Mandrake is 4.0.6-5.  The current release version is 4.1.2, and it's being 
recommended that sites using PHP upgrade to that version, which closes the 
exploit.  There's a story about the problem at 
http://news.cnet.com/2100-1001-847092.html that discusses the problem a 
bit.

If one of the employees who are on this list would forward this information 
to the right people at Mandrake, it would be appreciated.

                 --Dave
-- 
      David Guntner      GEnie: Just say NO!
 http://www.akaMail.com/pgpkey/davidg or key server
                 for PGP Public key


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to