Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 207752 - dev-lang/php cURL 'safe mode' Security Bypass Vulnerability (CVE-2007-4850)
Summary: dev-lang/php cURL 'safe mode' Security Bypass Vulnerability (CVE-2007-4850)
Status: RESOLVED DUPLICATE of bug 209148
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: PHP Bugs
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-01-27 21:28 UTC by Lars Hartmann
Modified: 2008-02-06 15:23 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Lars Hartmann 2008-01-27 21:28:57 UTC
curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence.
Comment 1 Christian Hoffmann (RETIRED) gentoo-dev 2008-01-27 21:32:21 UTC
Yep, saw that one in CVS already, will either provide a new patchset or snapshot in the next days.
This is non-critical, I think. Gentoo Security rates safe_mode/open_basedir issues with lowest priority (if at all), iirc.

Still, thanks to you and hanno /who messaged me about that today as well). :)
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2008-01-28 18:29:21 UTC
PHP "safe mode" issues are traditionally not handled as security issues.

Reassigning to maintainer.
Comment 3 Christian Hoffmann (RETIRED) gentoo-dev 2008-02-06 15:23:36 UTC
Marking as duplicate of bug 209148 which handles this and several other security issues.

*** This bug has been marked as a duplicate of bug 209148 ***