Is there some reason this issue is being ignored?  What, you people
need to see an exploit before you will even LOOK at it and answer
whether it is vuln?


> Can someone please give a straight answer about these PHP security
> holes?  OpenBSD 3.9 released yesterday had packages supporting:
> php 4.4.1p0
> php 5.0.5p0
> are either of these vulnerable? if so, is someone going to release
> updated packages (not just ports)?

> the php 5.1.3 release:

> The security issues resolved include the following:

>  * Disallow certain characters in session names.
>  * Fixed a buffer overflow inside the wordwrap() function.
>  * Prevent jumps to parent directory via the 2nd parameter of the tempnam() 
> function.
>  * Enforce safe_mode for the source parameter of the copy() function.
>  * Fixed cross-site scripting inside the phpinfo() function.
>  * Fixed offset/length parameter validation inside the substr_compare() 
> function.
>  * Fixed a heap corruption inside the session extension.
>  * Fixed a bug that would allow variable to survive unset().

> thanks

> Monday, May 1, 2006, 7:18:50 AM, you wrote:

>> Hi.

>> I haven't recieved a single test report, but I still get
>> letters about asking for an update. How's that?
>> This tarball also includes mysqli, fastcgi and hardened php support:
>> http://gi.unideb.hu/~robert/php.tar.gz

>> On (28/04/06 01:59), Robert Nagy wrote:
>>> Hi.
>>> 
>>> Finally after fighting with pear I've managed to create a working update
>>> for the php5 port.
>>> The PHP guys have changed the installation method of pear to use some crappy
>>> PHP_Archive. With this move they broke the installation of pear on serveral
>>> linux distros (e.g. Frugalware), OpenDarwin and on OpenBSD of course.
>>> Any other crappy package managements where they install files directly to 
>>> ${LOCALBASE}


-- 
Best regards,
 paul                            mailto:[EMAIL PROTECTED]

Reply via email to