curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence.
Yep, saw that one in CVS already, will either provide a new patchset or snapshot in the next days. This is non-critical, I think. Gentoo Security rates safe_mode/open_basedir issues with lowest priority (if at all), iirc. Still, thanks to you and hanno /who messaged me about that today as well). :)
PHP "safe mode" issues are traditionally not handled as security issues. Reassigning to maintainer.
Marking as duplicate of bug 209148 which handles this and several other security issues. *** This bug has been marked as a duplicate of bug 209148 ***