diff options
author | Eygene Ryabinkin <rea@FreeBSD.org> | 2011-01-13 05:44:53 +0000 |
---|---|---|
committer | Eygene Ryabinkin <rea@FreeBSD.org> | 2011-01-13 05:44:53 +0000 |
commit | 3b4eb838113bc67b0cf2b9d94258bcad8498cd57 (patch) | |
tree | 9271181a00a1aec44dc37aca233416778f0f8cbf /net/rabbitmq/files | |
parent | - Update to 1.3.9 (diff) |
Split recent PHP entry into multiple ones
Many reasons:
- some vulnerabilities were present only in the specific
PHP modules and not in the core PHP;
- it is better to group vulnerabilities by-topic (DoS, code
execution, etc);
- PHAR vulnerability is present only in 5.3.x;
- extract() vulnerability was fixed both in 5.2 and 5.3:
http://www.mail-archive.com/php-cvs@lists.php.net/msg47722.html
- NULL-byte poisoning was fixed only in 5.3, 5.2.x is still
vulnerable to this design error;
- DFS-related fixes are not relevant for FreeBSD, since DFS
is Windows file system that is unsupported by us.
PR: 153433
Approved by: remko (secteam), erwin (mentor)
Feature safe: yes
Notes
Notes:
svn path=/head/; revision=267723
Diffstat (limited to 'net/rabbitmq/files')
0 files changed, 0 insertions, 0 deletions