Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1736993284.1644101277926070301.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Wed, 30 Jun 2010 15:27:50 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- PHP strrchr() Interruption
 Information Leak  Vulnerability


----- "Péter Veres" <moltesalt@...il.com> wrote:

> Hi Steve,
> 
> PHP’s strrchr() function can be interrupted and used for information
> leakage due to call time pass by reference.
> 
> Could you allocate a CVE id for this issue?
> 

Do you have some sort of reference for this? I'm not finding anything in the
usual places.

I'll assign an ID once I have more information.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.