[CentOS] PHP vulnerability CVE-2016-4073
Прокси
proxy-one at mail.ruWed Sep 21 12:43:55 UTC 2016
- Previous message: [CentOS] PHP vulnerability CVE-2016-4073
- Next message: [CentOS] PHP vulnerability CVE-2016-4073
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On 2016-Sep-21 14:35, Adrian Sevcenco wrote: > On 09/21/2016 02:02 PM, Прокси wrote: > > Hello, > > > > My server with CentOS 6.8 just failed PCI scan, so I'm looking into > > vulnerable packages. PHP 5.3.3 have multiple vulnerabilities, some of > > them are fixed/patched or have some kind of workaround. But I can't find > > a way to fix this one. Red Hat state: under investigation. > > > > https://access.redhat.com/security/cve/cve-2016-4073 > > > > This CVE is 6 months old, and it doesn't look like it will be fixed. > > Does anyone knows the way to go around this? Except blocking mb_strcut() > > function. > you could try the unsupported php from remi repos... you can find there php 7.0 .. I use CentOS because I need stable and patched packages, so I can be sure that all applications work without unpleasant surprises. Going to unsupported packages would be my last option. > _______________________________________________ > CentOS mailing list > CentOS at centos.org > https://lists.centos.org/mailman/listinfo/centos
- Previous message: [CentOS] PHP vulnerability CVE-2016-4073
- Next message: [CentOS] PHP vulnerability CVE-2016-4073
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list