Summary: | <dev-lang/php-{5.4.44,5.5.28,5.6.12} : Multiple vulnerabilities and bugfixes (CVE-2015-{6831,6832,6833}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | devnull |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hanno, hydrapolic, php-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.php.net/ChangeLog-5.php#5.6.12 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
devnull
2015-08-07 13:28:01 UTC
Correct me if I'm wrong on this.. Should 5.6.12 be included with a vulnerability bug when the ChangeLog does not appear to list exploitable paths? (In reply to Brian Evans from comment #2) > Correct me if I'm wrong on this.. > > Should 5.6.12 be included with a vulnerability bug when the ChangeLog does > not appear to list exploitable paths? Nevermind, the ChangeLog was updated to list the SPL vulnerabilities on 5.6.12 Ebuilds committed. Feel free to stabilise Arches, please test and mark stable: =dev-lang/php-5.4.44 =dev-lang/php-5.5.28 =dev-lang/php-5.6.12 target KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" amd64 stable All three stable on alpha. x86 stable Stable for PPC64. Stable for HPPA. ia64 stable arm stable ppc stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Added to an existing GLSA Request. Maintainer(s), Thank you for you for cleanup. This issue was resolved and addressed in GLSA 201606-10 at https://security.gentoo.org/glsa/201606-10 by GLSA coordinator Kristian Fiskerstrand (K_F). |