| Summary: | PHP 5.3.26 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | RPM Packages | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, oe, sysadmin-bugs |
| Version: | 2 | Keywords: | Security, validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | mga2-32-ok MGA2-64-OK | ||
| Source RPM: | php | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-06-11 18:51:47 CEST
David Walser
2013-06-11 18:51:56 CEST
CC:
(none) =>
oe Testing mga2 32 Testing complete mga2 32 Whiteboard:
(none) =>
mga2-32-ok Testing complete, Mageia 2 x86_64. Could someone from the sysadmin team push the srpms php-5.3.26-1.mga2.src.rpm php-apc-3.1.13-1.8.mga2.src.rpm php-eaccelerator-0.9.6.1-10.10.mga2.src.rpm php-gd-bundled-5.3.26-1.mga2.src.rpm php-timezonedb-2013.3-1.mga2.src.rpm php-firebird-5.3.26-1.mga2.src.rpm php-pdo_firebird-5.3.26-1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: This update provides PHP 5.3.26, which fixes several issues. https://bugs.mageia.org/show_bug.cgi?id=10492 Keywords:
(none) =>
validated_update Thanks :o) Don't forget the references. References: http://www.php.net/ChangeLog-5.php Keywords = Security, even though it's not a security update? According to the description and changelog, it fixes a CVE. CC:
(none) =>
boklm http://advisories.mageia.org/MGASA-2013-0176.html Status:
NEW =>
RESOLVED In Bug 10456, it was determined that PHP 5.3 was not vulnerable to that CVE. This update also fixes CVE-2013-4635: http://lwn.net/Vulnerabilities/559055/ Advisory updated.
Nicolas Vigier
2014-05-08 18:04:42 CEST
CC:
boklm =>
(none) |