| Summary: | php - Strict Sessions (CVE-2011-4718) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/564819/ | ||
| Whiteboard: | |||
| Source RPM: | php | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-08-13 09:28:27 CEST
Looks like PHP 5.3 and 5.4 are also affected, looking at the last comment on the RH bug. Not sure when there will be fixes available, might be a while. In the meantime, PHP 5.5.2 is out, so this should be fixable in Cauldron now.
David Walser
2013-08-17 18:00:31 CEST
Summary:
CVE-2011-4718: php - Strict Sessions =>
php - Strict Sessions (CVE-2011-4718) Fedora has issued an advisory for this on August 19: https://lists.fedoraproject.org/pipermail/package-announce/2013-August/114648.html URL:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4718 =>
http://lwn.net/Vulnerabilities/564819/ At MDV we're taking the RH stance as of: https://bugzilla.redhat.com/show_bug.cgi?id=996774#c4 https://bugzilla.redhat.com/show_bug.cgi?id=996774#c5 No backport for php 5.3/5.4. Sounds reasonable. Since this is fixed in Cauldron, I'll mark it as FIXED. Just a note that this is really WONTFIX for Mageia 2 and Mageia 3. Status:
NEW =>
RESOLVED |