Control: retitle -1 pu: package php5/5.4.4-14+deb7u12

Hi release team,

yet another CVE update was pushed through stable-security, so I am
updating the title of the bug.

Again no changes in the debdiff, just rebased on top of security update.

Updated changelog:

php5 (5.4.4-14+deb7u12) stable; urgency=medium

  [ William Dauchy ]
  * upstream fix: $env can be destructively changed.
  * upstream fix: copy() arginfo incorrect since 5.4
  * upstream fix: Out of memory on command stream_get_contents
  * upstream fix: stream_socket_server() creates wrong Abstract
  Namespace UNIX sockets
  * upstream fix: exit in stream filter produces segfault
  * upstream fix: fpassthru broken
  * upstream fix: Incorrect object comparison with inheritance
  * upstream fix: openssl_seal() memory leak
  * upstream fix: Segfault in mysqli_stmt::bind_result() when link
  closed
  * upstream fix: Segmentation fault after memory_limit

 -- Ondřej Surý <[email protected]>  Tue, 27 May 2014 13:44:18 +0200

php5 (5.4.4-14+deb7u11) stable-security; urgency=high

  * [CVE-2014-4049]: Fix potential segfault in dns_get_record()

 -- Ondřej Surý <[email protected]>  Fri, 13 Jun 2014 15:43:03 +0200

php5 (5.4.4-14+deb7u10) stable-security; urgency=high

  * upstream fix: numerous file_printf calls resulting in performance
    degradation (CVE-2014-0237)
  * upstream fix: CDF infinite loop in nelements DoS (CVE-2014-0238)
  * upstream fix: out-of-bounds memory access in fileinfo
  (CVE-2014-2270)
  * upstream fix: sapi/fpm: possible privilege escalation due to
  insecure
    default configuration) (CVE-2014-0185)
  * Set default listen.{owner,group} to www-data:www-data

 -- Ondřej Surý <[email protected]>  Fri, 30 May 2014 09:08:14 +0200

Ondrej
-- 
Ondřej Surý <[email protected]>
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
https://lists.debian.org/[email protected]

Reply via email to