Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 3 Feb 2012 01:04:18 +0100
From: Pierre Joye <pierre.php@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: PHP remote code execution introduced via HashDoS fix

hi!

5.3.10 has been released as well to fix this issue (and another one
related to magic quotes).

Cheers,

On Thu, Feb 2, 2012 at 8:46 PM, Solar Designer <solar@...nwall.com> wrote:
> Tomas,
>
> Thank you for posting this.
>
> On Thu, Feb 02, 2012 at 08:12:22PM +0100, Tomas Hoger wrote:
>> This got CVE-2012-0830 assigned earlier today.  This is sent to make
>> the assignment public and avoid possible duplicate assignment.
>
> I suggest that we post this sort of things to oss-security not only
> because of CVE issues, but also to make this list a central place to
> keep people informed of security issues in at least popular Open Source
> software.  That is, I think this posting would be desirable even if the
> CVE number had already been communicated to those who might request one.
>
> Not everyone who wants this sort of info also happens to read IT news
> sites, Twitter feeds, etc daily (which also include lots of other info
> that would be off-topic here).
>
> Maybe your comment above was addressed to security@... and Stefan rather
> than to oss-security, though.  Then it sounds just right to me.
>
> Alexander



-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ