Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#12383 - PHP 5.2.7 has a serious security flaw
Attached to Project:
Arch Linux
Opened by Jozef Mares (kain) - Monday, 08 December 2008, 16:29 GMT
Last edited by Pierre Schmitz (Pierre) - Monday, 08 December 2008, 19:14 GMT
Opened by Jozef Mares (kain) - Monday, 08 December 2008, 16:29 GMT
Last edited by Pierre Schmitz (Pierre) - Monday, 08 December 2008, 19:14 GMT
|
DetailsDescription:
PHP 5.2.7 (which is in stable) has a serious security flaw. 5.2.7 was removed from php distribution yesterday. php.net recommends downgrade to 5.2.6 or Citation: For those who already have installed 5.2.7 can workaround the MQ bug by setting "filter.default_flags=0" in php.ini Additional info: * package version(s) PHP 5.2.7 Original php.net info: http://www.php.net/archive/2008.php#id2008-12-07-1 Steps to reproduce: Sync repos via pacman -Syu |
This task depends upon
Closed by Pierre Schmitz (Pierre)
Monday, 08 December 2008, 19:14 GMT
Reason for closing: Not a bug
Additional comments about closing: http://archlinux.org/pipermail/arch-gene ral/2008-December/002932.html
Monday, 08 December 2008, 19:14 GMT
Reason for closing: Not a bug
Additional comments about closing: http://archlinux.org/pipermail/arch-gene ral/2008-December/002932.html
http://repos.archlinux.org/viewvc.cgi/php/repos/extra-x86_64/PKGBUILD?r1=20469&r2=20787
If you think it is fixed lets close it.