Users of php please be advised of a GC Corruption vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
MDVSA-2010:239: [MDVSA-2010:239] php - GC Corruption Issue
Problem Description:Read more at www.criticalwatch.com
A possible double free flaw was found in the imap extension for php
(CVE-2010-4150).
A GC corrupting flaw was found in Zend/zend_gc.c for php-5.3.x that
under certain circumstances could case a segmention fault (crash).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct these issues.
See this Amp at http://bit.ly/ejHigd

No comments:
Post a Comment