PHP security update with buffer overflow and file handling flaw
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | php security update | 6 Apr 200900:00 | – | oraclelinux |
![]() | php security update | 6 Apr 200900:00 | – | oraclelinux |
![]() | Oracle Linux 3 / 4 : php (ELSA-2009-0337) | 12 Jul 201300:00 | – | nessus |
![]() | CentOS 3 / 4 : php (CESA-2009:0337) | 7 Apr 200900:00 | – | nessus |
![]() | RHEL 3 / 4 : php (RHSA-2009:0337) | 7 Apr 200900:00 | – | nessus |
![]() | CentOS 5 : php (CESA-2009:0338) | 6 Jan 201000:00 | – | nessus |
![]() | RHEL 5 : php (RHSA-2009:0338) | 7 Apr 200900:00 | – | nessus |
![]() | Scientific Linux Security Update : php on SL3.x, SL4.x, SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Oracle Linux 5 : php (ELSA-2009-0338) | 12 Jul 201300:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : php (MDVSA-2009:021) | 23 Apr 200900:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | x86_64 | php-domxml | 4.3.9-3.22.15 | php-domxml-4.3.9-3.22.15.x86_64.rpm |
RedHat | any | x86_64 | php-imap | 4.3.9-3.22.15 | php-imap-4.3.9-3.22.15.x86_64.rpm |
RedHat | any | ia64 | php-snmp | 4.3.9-3.22.15 | php-snmp-4.3.9-3.22.15.ia64.rpm |
RedHat | any | ppc | php-snmp | 4.3.9-3.22.15 | php-snmp-4.3.9-3.22.15.ppc.rpm |
RedHat | any | x86_64 | php-snmp | 4.3.9-3.22.15 | php-snmp-4.3.9-3.22.15.x86_64.rpm |
RedHat | any | i386 | php-domxml | 4.3.9-3.22.15 | php-domxml-4.3.9-3.22.15.i386.rpm |
RedHat | any | s390x | php-snmp | 4.3.9-3.22.15 | php-snmp-4.3.9-3.22.15.s390x.rpm |
RedHat | any | s390x | php | 4.3.9-3.22.15 | php-4.3.9-3.22.15.s390x.rpm |
RedHat | any | i386 | php-ldap | 4.3.9-3.22.15 | php-ldap-4.3.9-3.22.15.i386.rpm |
RedHat | any | ia64 | php-gd | 4.3.9-3.22.15 | php-gd-4.3.9-3.22.15.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo