Hi,

I'm sorry, but I have a question:

Is Sarge / stable going to get an update for these problems?

In particular, CVE-2005-3390 (GLOBALS array overwrite) for PHP, which
I believe Sarge / stable is vulnerable to (CVE entry says it applies
to "PHP 4.x up to 4.4.0"), and it is (IMO) a real-world security
problem that should be fixed in the stable release.

I had been assuming that the fix for this problem would go into Debian
3.1r2, the next stable release. However, the recent updates seem to be for
Testing.

Have I been following the wrong bug? (I couldn't see anything else
that looked suitable at http://qa.debian.org/bts-security.html#php4 )
Should I log a new bug specifically for Sarge, if I want an update for 3.1r2?
Or am I outright wrong, and these updates will be suitable for the
next Sarge release?

All the best,
Nick.

Reply via email to