Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Apr 2008 18:43:25 GMT
From:      mark burdett <mfburdett@gmail.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/122634: www/pecl-APC should be updated
Message-ID:  <200804101843.m3AIhPsQ092442@www.freebsd.org>
Resent-Message-ID: <200804101850.m3AIo1Ou014551@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         122634
>Category:       ports
>Synopsis:       www/pecl-APC should be updated
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Thu Apr 10 18:50:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     mark burdett
>Release:        
>Organization:
>Environment:
>Description:
www/pecl-APC should be updated from 3.0.16 to 3.0.18

3.0.17 addressed a critical security vulnerability: CVE-2008-1488

Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200804101843.m3AIhPsQ092442>