Commit:    52cb11fca4c343f0529ceecfdc5372b49b966435
Author:    Lior Kaplan <[email protected]>         Thu, 25 Dec 2014 19:18:41 
+0200
Parents:   a6af1b908ae197567a6ab16e17170f4a3de5196f
Branches:  master

Link:       
http://git.php.net/?p=web/php.git;a=commitdiff;h=52cb11fca4c343f0529ceecfdc5372b49b966435

Log:
Add missing CVE ID for bug 68594 (and align format)

Bugs:
https://bugs.php.net/68594

Changed paths:
  M  ChangeLog-5.php


Diff:
diff --git a/ChangeLog-5.php b/ChangeLog-5.php
index 6e14e0e..babd47f 100644
--- a/ChangeLog-5.php
+++ b/ChangeLog-5.php
@@ -21,7 +21,7 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", 
"css" => array("change
   <li><?php bugfix(68422); ?> (Incorrect argument reflection info for 
array_multisort()).</li>
   <li><?php bugfix(68545); ?> (NULL pointer dereference in unserialize.c).</li>
   <li><?php bugfix(68446); ?> (Array constant not accepted for array parameter 
default).</li>
-  <li><?php bugfix(68594); ?> (Use after free vulnerability in 
unserialize()).</li>
+  <li><?php bugfix(68594); ?> (Use after free vulnerability in unserialize()). 
(CVE-2014-8142)</li>
 </ul></li>
 <li>Date:
 <ul>
@@ -77,7 +77,7 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", 
"css" => array("change
   <li><?php bugfix(68185); ?> ("Inconsistent insteadof definition."- 
incorrectly triggered).</li>
   <li><?php bugfix(68370); ?> ("unset($this)" can make the program crash).</li>
   <li><?php bugfix(68545); ?> (NULL pointer dereference in unserialize.c).</li>
-  <li><?php bugfix(68594); ?> (Use after free vulnerability in 
unserialize())(CVE-2014-8142).</li>
+  <li><?php bugfix(68594); ?> (Use after free vulnerability in unserialize()). 
(CVE-2014-8142)</li>
 </ul></li>
 <li>Date:
 <ul>
@@ -121,7 +121,7 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", 
"css" => array("change
 <ul>
   <li>Upgraded crypt_blowfish to version 1.3.</li>
   <li><?php bugfix(68545); ?> (NULL pointer dereference in unserialize.c).</li>
-  <li><?php bugfix(68594); ?> (Use after free vulnerability in unserialize()) 
(CVE-2014-8142).</li>
+  <li><?php bugfix(68594); ?> (Use after free vulnerability in unserialize()). 
(CVE-2014-8142)</li>
 </ul>
 <!-- }}} --></section>


--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to