Ad Widget

Collapse

Upgrade PHP due to Qualys vulnerability findings

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • iwidjaya
    Junior Member
    • Apr 2016
    • 16

    #1

    Upgrade PHP due to Qualys vulnerability findings

    Here's my php version for Zabbix Server 3.0 which I just installed:

    rpm -qa | grep php
    php-xml-5.4.16-36.el7_1.x86_64
    php-5.4.16-36.el7_1.x86_64
    php-mbstring-5.4.45-5.el7.remi.x86_64
    php-common-5.4.16-36.el7_1.x86_64
    php-cli-5.4.16-36.el7_1.x86_64
    php-pdo-5.4.16-36.el7_1.x86_64
    php-gd-5.4.16-36.el7_1.x86_64
    php-bcmath-5.4.45-7.el7.remi.x86_64
    php-ldap-5.4.16-36.el7_1.x86_64
    php-mysql-5.4.16-36.el7_1.x86_64

    It's been discovered that this PHP version has Qualys findings: PHP Versions Prior to 5.6.11/5.5.27/5.4.43 "mysqlnd" BACKRONYM Vulnerability

    Check in http://www.php.net/ and seems that 5.4 is no longer supported.

    If we have to upgrade this to later version will this be affecting the functionality of Zabbix UI (as I read in manual it is mentioning about - The minimum required PHP version has been upped from 5.3.0 to 5.4.0) ?

    Does anyone know/have a workaround to resolve this finding?
Working...