| Summary: | PHP 5.6.25 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/698797/ | ||
| Whiteboard: | MGA5-64-OK advisory | ||
| Source RPM: | php-5.6.24-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-08-19 16:07:41 CEST
Looks like gdbm databases are incompatible between i586 and x86_64 (I just switched my workstation at home to x86_64 last weekend), so that's a shame, but starting with a fresh one, my normal apache/php/php-gd/php-cgi/php-dba/mod_suexec/mod_userdir test works fine on Mageia 5 x86_64. Whiteboard:
(none) =>
MGA5-64-OK
Dave Hodgins
2016-08-26 01:05:52 CEST
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0293.html Status:
NEW =>
RESOLVED
David Walser
2016-08-31 22:43:32 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/698797/ CVEs have been assigned: http://www.openwall.com/lists/oss-security/2016/09/02/9 The last two were PHP 7.0.x only. Also, CVE-2016-7126 and CVE-2016-7127 only affect bundled gd, and not us using external libgd. So we have for this update: CVE-2016-7124 CVE-2016-7125 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 |