Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 13 Jul 2010 21:00:12 +0200
From: Pierre Joye <pierre.php@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request, php var_export

hi,

I would like to request a new # for a flaw in php's var_export. The
reason is that a fatal error occurs due to recursion, memory limit or
execution time var_export bails out. The buffer is never cleared and
it flushes to the user. It's not affected by display_errors() since
its considered part of the output.

Fix already commited to trunk, 5.2 and 5.3 and will be in the next PHP
releases (5.2.14 and 5.3.3):

http://svn.php.net/viewvc?view=revision&revision=301143

Cheers,
-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.