Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Gentoo Security Advisory GLSA 201001-03 (php)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing updates announced in advisory GLSA 201001-03.
Insight
Insight
Multiple vulnerabilities were found in PHP, the worst of which leading to the remote execution of arbitrary code.
Solution
Solution
All PHP users should upgrade to the latest version. As PHP is statically linked against a vulnerable version of the c-client library when the imap or kolab USE flag is enabled (GLSA 200911-03), users should upgrade net-libs/c-client beforehand: # emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/c-client-2007e' # emerge --ask --oneshot --verbose '>=dev-lang/php-5.2.12' http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201001-03 http://bugs.gentoo.org/show_bug.cgi?id=249875 http://bugs.gentoo.org/show_bug.cgi?id=255121 http://bugs.gentoo.org/show_bug.cgi?id=260576 http://bugs.gentoo.org/show_bug.cgi?id=261192 http://bugs.gentoo.org/show_bug.cgi?id=266125 http://bugs.gentoo.org/show_bug.cgi?id=274670 http://bugs.gentoo.org/show_bug.cgi?id=280602 http://bugs.gentoo.org/show_bug.cgi?id=285434 http://bugs.gentoo.org/show_bug.cgi?id=292132 http://bugs.gentoo.org/show_bug.cgi?id=293888 http://bugs.gentoo.org/show_bug.cgi?id=297369 http://bugs.gentoo.org/show_bug.cgi?id=297370 http://www.gentoo.org/security/en/glsa/glsa-200911-03.xml