Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:60690 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 92550 invoked from network); 29 May 2012 23:22:32 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 29 May 2012 23:22:32 -0000 Authentication-Results: pb1.pair.com smtp.mail=smalyshev@sugarcrm.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=smalyshev@sugarcrm.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain sugarcrm.com designates 67.192.241.183 as permitted sender) X-PHP-List-Original-Sender: smalyshev@sugarcrm.com X-Host-Fingerprint: 67.192.241.183 smtp183.dfw.emailsrvr.com Linux 2.6 Received: from [67.192.241.183] ([67.192.241.183:33177] helo=smtp183.dfw.emailsrvr.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 11/92-12504-73A55CF4 for ; Tue, 29 May 2012 19:22:32 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp8.relay.dfw1a.emailsrvr.com (SMTP Server) with ESMTP id 6073E8E2E; Tue, 29 May 2012 19:22:28 -0400 (EDT) X-Virus-Scanned: OK Received: by smtp8.relay.dfw1a.emailsrvr.com (Authenticated sender: smalyshev-AT-sugarcrm.com) with ESMTPSA id 549DB8DF6; Tue, 29 May 2012 19:22:25 -0400 (EDT) Message-ID: <4FC55A2F.3030007@sugarcrm.com> Date: Tue, 29 May 2012 16:22:23 -0700 Organization: SugarCRM User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:12.0) Gecko/20120428 Thunderbird/12.0.1 MIME-Version: 1.0 To: Stefan Esser CC: Mailing-List php References: <5262BA67-53D2-4D19-9AD6-B1BFDABAC32E@sektioneins.de> In-Reply-To: <5262BA67-53D2-4D19-9AD6-B1BFDABAC32E@sektioneins.de> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] zend_execute_internal hook missing from PHP 5 From: smalyshev@sugarcrm.com (Stas Malyshev) Hi! > it recently came to my attention that the function whitelist and > blacklist feature inside Suhosin is easily bypassable since PHP 5.0. Did you have a bug report for this? If not, could you please submit one so we could track it properly? If yes, please send me its number. Thanks, -- Stanislav Malyshev, Software Architect SugarCRM: http://www.sugarcrm.com/ (408)454-6900 ext. 227