Date: Thu, 10 Apr 2008 18:43:25 GMT From: mark burdett <mfburdett@gmail.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/122634: www/pecl-APC should be updated Message-ID: <200804101843.m3AIhPsQ092442@www.freebsd.org> Resent-Message-ID: <200804101850.m3AIo1Ou014551@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 122634 >Category: ports >Synopsis: www/pecl-APC should be updated >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Thu Apr 10 18:50:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: mark burdett >Release: >Organization: >Environment: >Description: www/pecl-APC should be updated from 3.0.16 to 3.0.18 3.0.17 addressed a critical security vulnerability: CVE-2008-1488 Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename. >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200804101843.m3AIhPsQ092442>