Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 207752

Summary: dev-lang/php cURL 'safe mode' Security Bypass Vulnerability (CVE-2007-4850)
Product: Gentoo Linux Reporter: Lars Hartmann <lars>
Component: New packagesAssignee: PHP Bugs <php-bugs>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4850
Whiteboard:
Package list:
Runtime testing required: ---

Description Lars Hartmann 2008-01-27 21:28:57 UTC
curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence.
Comment 1 Christian Hoffmann (RETIRED) gentoo-dev 2008-01-27 21:32:21 UTC
Yep, saw that one in CVS already, will either provide a new patchset or snapshot in the next days.
This is non-critical, I think. Gentoo Security rates safe_mode/open_basedir issues with lowest priority (if at all), iirc.

Still, thanks to you and hanno /who messaged me about that today as well). :)
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2008-01-28 18:29:21 UTC
PHP "safe mode" issues are traditionally not handled as security issues.

Reassigning to maintainer.
Comment 3 Christian Hoffmann (RETIRED) gentoo-dev 2008-02-06 15:23:36 UTC
Marking as duplicate of bug 209148 which handles this and several other security issues.

*** This bug has been marked as a duplicate of bug 209148 ***