On Fri, 03 Feb 2012 13:03:24 +0100, Gustavo Lopes <glo...@nebm.ist.utl.pt> wrote:

On Fri, 03 Feb 2012 12:06:26 +0100, Stefan Esser <stefan.es...@sektioneins.de> wrote:

[snip]
obviously inside PHP no one cares about reviewing security patches.


Perhaps then you'd want to comment on: http://nebm.ist.utl.pt/~glopes/misc/bug60227.diff , which addresses the NUL byte issue, although now I'm thinking that since we're in the business of validating HTTP headers, we could also forbid the other control characters that are forbidden by the spec (not just LF and CR).


I've committed a different version that also forbids \0 (since, as Stefan says, a NUL byte can result in the truncation of the rest of the header) and that accepts a CRLF:

http://svn.php.net/viewvc/php/php-src/trunk/main/SAPI.c?r1=323043&r2=323042&pathrev=323043

If you or anyone else find any problem, please report a bug; otherwise I'll merge to 5.3 and 5.4 once 5.4 is out of code freeze.

Thanks

--
Gustavo Lopes

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to