Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Nov 2010 17:43:59 +0100
From: Pierre Joye <>
Subject: Re: NULL byte poisoning fix in php 5.3.4+

forgot to add the fixes revs:
revert of part of the OCI8 fix

OCI8 fix (committed separately)

On Thu, Nov 18, 2010 at 5:22 PM, Pierre Joye <> wrote:
> hi,
> The problem describes here, in
> (and numerous other places) has been fixed
> in PHP_5_3, targetting 5.3.4 (RC1 to be released today). It is a well
> (old) known issue in PHP and I wonder if there is a CVE already for
> it? If not I think having one could helpful. or?
> Cheers,
> --
> Pierre
> @pierrejoye | |


@pierrejoye | |

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ