Hi, I'm looking through the list of security issues listed in the 5.2.1 release notes; trying to work out what the impact of these issues is so we're able to explain to our users how they are affected.
Could anyone help clarify a few of the items listed? - Fixed allocation bugs caused by attempts to allocate negative values in some code paths I presume this refers only to the numerous emalloc->safe_emalloc changes, is that correct? - Fixed unserialize() abuse on 64 bit systems with certain input strings The only change to the unserializer in 5.2.1 that I can find was to add support for the "S:" token type; this doesn't seem security-related. Is there something I missed here? Was it a fix to the generated parser code rather than the grammar/sources? - Fixed a possible buffer overflow inside mail() and ibase_{delete,add,modify}_user() functions. The only change to mail() was: http://cvs.php.net/viewvc.cgi/php-src/ext/standard/mail.c?r1=1.87.2.1.2.1&r2=1.87.2.1.2.2&diff_format=u I can't see how the old code could present a security issue here. There were no changes to the sqlite extension per se, but the change to the bundled copy of the sqlite library looks like like a buffer overrun fix: http://cvs.php.net/viewvc.cgi/php-src/ext/sqlite/libsqlite/src/encode.c?r1=1.5.4.1&r2=1.5.4.1.2.1&diff_format=u or am I missing something else? (so, any user who configures using an external copy of sqlite2 would still be vulnerable to that issue) Regards, joe -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php