lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <42C12F15.6010203@php.net>
Date: Tue Jun 28 12:20:27 2005
From: sesser at php.net (Stefan Esser)
Subject: PHP: Calendar Buffer Overflow

Martin Pitt wrote:

>Of course that is a bug that should be fixed in CVS head, but I think
>it's not exploitable, so it does not require a security update as far
>as I can see.
>  
>
This bug was fixed in the PHP CVS 16 month ago for the PHP 5 branch, but 
was not commited to the PHP 4_3 branch until 2 month ago. This means the 
fix will be in the upcoming PHP 4.4.

Greets,
Stefan Esser

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ