1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<TITLE> [Mageia-dev] Freeze push: php, php-timezonedb, php-xdebug
</TITLE>
<LINK REL="Index" HREF="index.html" >
<LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20php%2C%20php-timezonedb%2C%20php-xdebug&In-Reply-To=%3C20120505084503.GO21938%40mars-attacks.org%3E">
<META NAME="robots" CONTENT="index,nofollow">
<META http-equiv="Content-Type" content="text/html; charset=us-ascii">
<LINK REL="Previous" HREF="015299.html">
<LINK REL="Next" HREF="015260.html">
</HEAD>
<BODY BGCOLOR="#ffffff">
<H1>[Mageia-dev] Freeze push: php, php-timezonedb, php-xdebug</H1>
<B>nicolas vigier</B>
<A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20php%2C%20php-timezonedb%2C%20php-xdebug&In-Reply-To=%3C20120505084503.GO21938%40mars-attacks.org%3E"
TITLE="[Mageia-dev] Freeze push: php, php-timezonedb, php-xdebug">boklm at mars-attacks.org
</A><BR>
<I>Sat May 5 10:45:03 CEST 2012</I>
<P><UL>
<LI>Previous message: <A HREF="015299.html">[Mageia-dev] Freeze push: php, php-timezonedb, php-xdebug
</A></li>
<LI>Next message: <A HREF="015260.html">[Mageia-dev] Freeze push: squidanalyzer
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#15305">[ date ]</a>
<a href="thread.html#15305">[ thread ]</a>
<a href="subject.html#15305">[ subject ]</a>
<a href="author.html#15305">[ author ]</a>
</LI>
</UL>
<HR>
<!--beginarticle-->
<PRE>On Sat, 05 May 2012, David Walser wrote:
><i> nicolas vigier <<A HREF="https://www.mageia.org/mailman/listinfo/mageia-dev">boklm at ...</A>> writes:
</I>><i> > On Fri, 04 May 2012, David Walser wrote:
</I>><i> > > A major new security issue, CVE-2012-2311, with remote code execution and all
</I>><i> > > kinds of other problems and publicly available exploits, has just been
</I>><i> > > announced. A fix is supposed to be available from upstream soon.
</I>><i> >
</I>><i> > php, php-timezonedb and php-xdebug have been submitted.
</I>><i>
</I>><i> Thanks. Can you repush php? I just added a patch to fix CVE-2012-2311.
</I>
Ok, submitted.
</PRE>
<!--endarticle-->
<HR>
<P><UL>
<!--threads-->
<LI>Previous message: <A HREF="015299.html">[Mageia-dev] Freeze push: php, php-timezonedb, php-xdebug
</A></li>
<LI>Next message: <A HREF="015260.html">[Mageia-dev] Freeze push: squidanalyzer
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#15305">[ date ]</a>
<a href="thread.html#15305">[ thread ]</a>
<a href="subject.html#15305">[ subject ]</a>
<a href="author.html#15305">[ author ]</a>
</LI>
</UL>
<hr>
<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev
mailing list</a><br>
</body></html>
|