php5 (5.3.6-13ubuntu3.8) oneiric-security; urgency=low

  * SECURITY UPDATE: denial of service via invalid tidy objects
    - debian/patches/CVE-2012-0781.patch: track initialization in
      ext/tidy/tidy.c, added tests to ext/tidy/tests/004.phpt,
      ext/tidy/tests/bug54682.phpt.
    - CVE-2012-0781
  * SECURITY UPDATE: denial of service or possible directory traversal via
    invalid filename.
    - debian/patches/CVE-2012-1172.patch: ensure brackets get closed in
      main/rfc1867.c, add test to tests/basic/bug55500.phpt.
    - CVE-2012-1172
  * SECURITY UPDATE: password truncation via invalid byte
    - debian/patches/CVE-2012-2143.patch: improve logic in
      ext/standard/crypt_freesec.c, add test to
      ext/standard/tests/strings/crypt_chars.phpt.
    - CVE-2012-2143
  * SECURITY UPDATE: improve php5-cgi query string parameter parsing
    - debian/patches/CVE-2012-233x.patch: improve parsing in
      sapi/cgi/cgi_main.c.
    - CVE-2012-2335
    - CVE-2012-2336
  * SECURITY UPDATE: phar extension heap overflow
    - debian/patches/CVE-2012-2386.patch: check for overflow in
      ext/phar/tar.c.
    - CVE-2012-2386

Date: Tue, 12 Jun 2012 15:31:43 -0400
Changed-By: Marc Deslauriers <[email protected]>
Maintainer: Ubuntu Developers <[email protected]>
https://launchpad.net/ubuntu/oneiric/+source/php5/5.3.6-13ubuntu3.8
Format: 1.8
Date: Tue, 12 Jun 2012 15:31:43 -0400
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi 
php5-cli php5-fpm php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd 
php5-gmp php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell 
php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.6-13ubuntu3.8
Distribution: oneiric-security
Urgency: low
Maintainer: Ubuntu Developers <[email protected]>
Changed-By: Marc Deslauriers <[email protected]>
Description: 
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 
module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language 
(apache 2 filter mo
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mysql - MySQL module for php5
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-pspell - pspell module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Changes: 
 php5 (5.3.6-13ubuntu3.8) oneiric-security; urgency=low
 .
   * SECURITY UPDATE: denial of service via invalid tidy objects
     - debian/patches/CVE-2012-0781.patch: track initialization in
       ext/tidy/tidy.c, added tests to ext/tidy/tests/004.phpt,
       ext/tidy/tests/bug54682.phpt.
     - CVE-2012-0781
   * SECURITY UPDATE: denial of service or possible directory traversal via
     invalid filename.
     - debian/patches/CVE-2012-1172.patch: ensure brackets get closed in
       main/rfc1867.c, add test to tests/basic/bug55500.phpt.
     - CVE-2012-1172
   * SECURITY UPDATE: password truncation via invalid byte
     - debian/patches/CVE-2012-2143.patch: improve logic in
       ext/standard/crypt_freesec.c, add test to
       ext/standard/tests/strings/crypt_chars.phpt.
     - CVE-2012-2143
   * SECURITY UPDATE: improve php5-cgi query string parameter parsing
     - debian/patches/CVE-2012-233x.patch: improve parsing in
       sapi/cgi/cgi_main.c.
     - CVE-2012-2335
     - CVE-2012-2336
   * SECURITY UPDATE: phar extension heap overflow
     - debian/patches/CVE-2012-2386.patch: check for overflow in
       ext/phar/tar.c.
     - CVE-2012-2386
Checksums-Sha1: 
 b87eeb12b9812c0d9cd5eee2d4dce940f8f327ed 3261 php5_5.3.6-13ubuntu3.8.dsc
 6ecd3281051f5b12358ee8a87b01c43a680e7045 897465 php5_5.3.6-13ubuntu3.8.diff.gz
Checksums-Sha256: 
 b5d59499df85856f4136b6417939bebaf83db81319632e8d1cf2395dc093365c 3261 
php5_5.3.6-13ubuntu3.8.dsc
 ebc5387cfbeba065771880195ca4380369c288c0b551d7f85e88a45cc3199a64 897465 
php5_5.3.6-13ubuntu3.8.diff.gz
Files: 
 2aa703aa91b23ad07d615d0a2328d736 3261 php optional php5_5.3.6-13ubuntu3.8.dsc
 7b70be813b600bc514c12605ceff297a 897465 php optional 
php5_5.3.6-13ubuntu3.8.diff.gz
Original-Maintainer: Debian PHP Maintainers 
<[email protected]>
-- 
Oneiric-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/oneiric-changes

Reply via email to