[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[plamo:27485] Re: PHP 4.4.4, 5.1.5
-
From:jun kuwamura
-
Date:Thu, 24 Aug 2006 23:48:48 +0900 (JST)
- Subject: [plamo:27485] Re: PHP 4.4.4, 5.1.5
- From: "jun kuwamura" <kuwamura.jun@xxxxxxxxx>
- Date: Thu, 24 Aug 2006 23:48:42 +0900
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws;s=beta; d=gmail.com;h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references;b=cfqH52qlm//NP4EPaYWcU5j9gYF+tMoRlKB4jhGfj+MY/9/8c/ogLS8I/FC76fQTnBICFp+ao1vnFOtcQjfOuBVSlrFlFBZwYdCFCPLUS5QvNVtQ+OYKV9BgOPZfoJlh3p62MnNwwsMAhTxgWEVZ+3vk2mOg/HsGN1BLNOelJE8=
くわむらです。
ありがとうございます。
Plamo4.2用の PHP-5.1.5 Herdened-0.4.14 パッケージです。
http://www.linet.gr.jp/~juk/plamo/parts/4.2/
WWW/php-5.1.5_0.4.14-i386-P1.tgz
WWW/php_doc_jp-5.1.5-noname-P1.tgz
On 8/18/06, KATOH Yasufumi <karma@jazz.email.ne.jp> wrote:
> 加藤泰文です.
>
> PHP 4.4.4 と 5.1.5 が出ています.セキュリティホール修正を含みます.
>
> http://jp.php.net/release_4_4_4.php
> http://jp.php.net/release_5_1_5.php
>
> ---
> ついでに今まであまり紹介してなかった小物(?)セキュリティホール情報を
> (Plamo に関係あるかあまりちゃんと調べてません).
>
> Mozilla Firefox Memory Corruption Weakness
> http://secunia.com/advisories/21513/
>
> GNU Binutils assembler Buffer Overflow Vulnerability
> http://secunia.com/advisories/21508/
>
> Linux Kernel UDF Truncation Denial of Service
> http://secunia.com/advisories/21515/
>
> X11 libXfont PCF Integer Overflow Vulnerability
> http://secunia.com/advisories/21450/
> # XFree86 でも似たようなの出てます.
>
> ImageMagick "ReadSGIImage()" Integer Overflow Vulnerability
> http://secunia.com/advisories/21462/
>
> --
> ==============================================
> (((( 加藤泰文
> ○-○ karma @ jazz.email.ne.jp
> ==============================================
> (Web Page) http://park2.wakwak.com/%7Ekarma/
> ==============================================
>
>
- Follow-Ups
-
- [plamo:27509] Re: PHP 4.4.4, 5.1.5, jun kuwamura
- References
-
- [plamo:27469] PHP 4.4.4, 5.1.5, KATOH Yasufumi
[検索ページ]
[メール一覧]
Plamo ML 公開システム