Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 10 Jan 2011 20:48:01 +0100
From: Pierre Joye <pierre.php@...il.com>
To: Eygene Ryabinkin <rea-sec@...elabs.ru>
Cc: oss-security@...ts.openwall.com, kalle@....net, felipe@....net, 
	cellog@....net, pajoye@....net
Subject: Re: Re: CVE-2010-2094: PECL's phar code is vulnerable too

I have to do it. But I would suggest to use the released version in
the mean time. Zero difference in the code base.

On Mon, Jan 10, 2011 at 6:38 PM, Eygene Ryabinkin <rea-sec@...elabs.ru> wrote:
> Felipe, good day.
>
> Sun, Dec 26, 2010 at 05:26:29PM -0200, Felipe Pena wrote:
>> Yes, I will contact anyone to do it... (I'm not the ext/phar maintainer)
>
> Any news on this?  http://pecl.php.net/package/phar shows no
> revisions :((
> --
> Eygene
>



-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.