php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
- CVE-2011-2202
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
[ Steve Beattie ]
* SECURITY UPDATE: DoS in zip handling due to addGlob() crashing
on invalid flags
- debian/patches/php5-CVE-2011-1657.patch: check for valid flags
- CVE-2011-1657
* SECURITY UPDATE: crypt_blowfish doesn't properly handle 8-bit
(non-ascii) passwords leading to a smaller collision space
- debian/patches/php5-CVE-2011-2483.patch: update crypt_blowfish
to 1.2 to correct handling of passwords containing 8-bit
(non-ascii) characters.
CVE-2011-2483
* SECURITY UPDATE: DoS due to failure to check for memory allocation errors
- debian/patches/php5-CVE-2011-3182.patch: check the return values
of the malloc, calloc, and realloc functions
- CVE-2011-3182
* SECURITY UPDATE: DoS in errorlog() when passed NULL
- debian/patches/php5-CVE-2011-3267.patch: fix NULL pointer crash in
errorlog()
- CVE-2011-3267
* SECURITY UPDATE: information leak via handler interrupt (LP: #852871)
- debian/patches/php5-CVE-2010-1914.patch: grab references before
calling zendi_convert_to_long()
- CVE-2010-1914
Date: Fri, 14 Oct 2011 14:24:59 -0700
Changed-By: Steve Beattie <[email protected]>
Maintainer: Ubuntu Developers <[email protected]>
https://launchpad.net/ubuntu/lucid/+source/php5/5.3.2-1ubuntu4.10
Format: 1.8
Date: Fri, 14 Oct 2011 14:24:59 -0700
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi
php5-cli php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp
php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode
php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.2-1ubuntu4.10
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <[email protected]>
Changed-By: Steve Beattie <[email protected]>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2
module)
libapache2-mod-php5filter - server-side, HTML-embedded scripting language
(apache 2 filter mo
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (metapackage)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dbg - Debug symbols for PHP5
php5-dev - Files for PHP5 module development
php5-enchant - Enchant module for php5
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-intl - internationalisation module for php5
php5-ldap - LDAP module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Launchpad-Bugs-Fixed: 813110 813115 852871
Changes:
php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
.
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
- CVE-2011-2202
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
.
[ Steve Beattie ]
* SECURITY UPDATE: DoS in zip handling due to addGlob() crashing
on invalid flags
- debian/patches/php5-CVE-2011-1657.patch: check for valid flags
- CVE-2011-1657
* SECURITY UPDATE: crypt_blowfish doesn't properly handle 8-bit
(non-ascii) passwords leading to a smaller collision space
- debian/patches/php5-CVE-2011-2483.patch: update crypt_blowfish
to 1.2 to correct handling of passwords containing 8-bit
(non-ascii) characters.
CVE-2011-2483
* SECURITY UPDATE: DoS due to failure to check for memory allocation errors
- debian/patches/php5-CVE-2011-3182.patch: check the return values
of the malloc, calloc, and realloc functions
- CVE-2011-3182
* SECURITY UPDATE: DoS in errorlog() when passed NULL
- debian/patches/php5-CVE-2011-3267.patch: fix NULL pointer crash in
errorlog()
- CVE-2011-3267
* SECURITY UPDATE: information leak via handler interrupt (LP: #852871)
- debian/patches/php5-CVE-2010-1914.patch: grab references before
calling zendi_convert_to_long()
- CVE-2010-1914
Checksums-Sha1:
d9595b449b53075dbce73d04acf8e34b03449af5 3170 php5_5.3.2-1ubuntu4.10.dsc
14b934be8482d0c0395deb42db6eb68f6af69f45 238414 php5_5.3.2-1ubuntu4.10.diff.gz
Checksums-Sha256:
139a82111930dfcab8970c7701211dda534b2f531b6653aa7e7a448669f89e46 3170
php5_5.3.2-1ubuntu4.10.dsc
f943274ceaa56a25415dde581725b3801a80757fb9d4f8a5a3ce9a4847c5e443 238414
php5_5.3.2-1ubuntu4.10.diff.gz
Files:
a1055bb9affd1280f0b09967e05c7d5c 3170 php optional php5_5.3.2-1ubuntu4.10.dsc
99121473f65f497b719135adab159d95 238414 php optional
php5_5.3.2-1ubuntu4.10.diff.gz
Original-Maintainer: Debian PHP Maintainers
<[email protected]>
--
Lucid-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/lucid-changes