Date: Thu, 24 Mar 2011 22:12:15 GMT From: Chris Tandiono <christandiono@tbp.berkeley.edu> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/155922: php5 <5.3.5 has a security flaw Message-ID: <201103242212.p2OMCFOu075387@red.freebsd.org> Resent-Message-ID: <201103242220.p2OMKASK058476@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 155922 >Category: ports >Synopsis: php5 <5.3.5 has a security flaw >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Thu Mar 24 22:20:10 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Chris Tandiono >Release: 8.1-RELEASE-p2 >Organization: TBP CA-A IT Committee >Environment: FreeBSD tbp.berkeley.edu 8.1-RELEASE FreeBSD 8.1-RELEASE #0: Mon Jul 19 02:55:53 UTC 2010 root@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 >Description: Please mark php5 < 5.3.6 as having a security problem due to the following: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0421 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0708 http://www.tenablesecurity.com/5824.html >How-To-Repeat: Install PHP < 5.3.6 >Fix: Upgrade to PHP 5.3.6 >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201103242212.p2OMCFOu075387>