Hi Salvatore,

I have prepared versions for unstable (already uploaded) and for wheezy
(compiling right now) with patch from upstream.

I'll submit it to [email protected] after it finishes the compilation.

Whoever is doing squeeze LTS feel free to cherry-pick from git and
commit back to our git.

O.

On Thu, Jun 12, 2014, at 8:19, Salvatore Bonaccorso wrote:
> Source: php5
> Severity: grave
> Tags: security upstream
> 
> Hi
> 
> A heap-based buffer overflow was commited in [1], Red Hat Bugzilla
> reference at [2].
> 
>  [1]
>  
> https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468
>  [2] https://bugzilla.redhat.com/show_bug.cgi?id=1108447
> 
> A CVE assignment is pending. Could you also mark affected versions for
> the BTS? From a quick(!) look it seems that all versions have the
> vulnerable code present.
> 
> Regards,
> Salvatore
> 
> _______________________________________________
> pkg-php-maint mailing list
> [email protected]
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-php-maint


-- 
Ondřej Surý <[email protected]>
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to