[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-16 Thread aster
Very good approach for this update! BC breaker would be to jump to 7.1.x
release. So as long as there are upstream updates for 7.0.x this
repository should implement those.

Thank you for good job on this and all the rest packages!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-11 Thread Launchpad Bug Tracker
This bug was fixed in the package php7.0 - 7.0.13-0ubuntu0.16.10.1

---
php7.0 (7.0.13-0ubuntu0.16.10.1) yakkety; urgency=medium

  * New upstream release
- LP: #1645431
- Refresh patches for new upstream release.
  * Drop:
- SECURITY UPDATE: proxy request header vulnerability (httpoxy)
  + debian/patches/CVE-2016-5385.patch: only use HTTP_PROXY from the
local environment in ext/standard/basic_functions.c, main/SAPI.c,
main/php_variables.c.
  + CVE-2016-5385
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: inadequate error handling in bzread()
  + debian/patches/CVE-2016-5399.patch: do not allow reading past error
read in ext/bz2/bz2.c.
  + CVE-2016-5399
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in the virtual_file_ex function
  + debian/patches/CVE-2016-6289.patch: properly check path_length in
Zend/zend_virtual_cwd.c.
  + CVE-2016-6289
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free in unserialize() with unexpected
  session deserialization
  + debian/patches/CVE-2016-6290.patch: destroy var_hash properly in
ext/session/session.c, added test to ext/session/tests/bug72562.phpt.
  + CVE-2016-6290
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: out of bounds read in exif_process_IFD_in_MAKERNOTE
  + debian/patches/CVE-2016-6291.patch: add more bounds checks to
ext/exif/exif.c.
  + CVE-2016-6291
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: NULL pointer dereference in exif_process_user_comment
  + debian/patches/CVE-2016-6292.patch: properly handle encoding in
ext/exif/exif.c.
  + CVE-2016-6292
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: locale_accept_from_http out-of-bounds access
  + debian/patches/CVE-2016-6294.patch: check length in
ext/intl/locale/locale_methods.c, added test to
ext/intl/tests/bug72533.phpt.
  + CVE-2016-6294
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free vulnerability in SNMP with GC and
  unserialize()
  + debian/patches/CVE-2016-6295.patch: add new handler to
ext/snmp/snmp.c, add test to ext/snmp/tests/bug72479.phpt.
  + CVE-2016-6295
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: heap buffer overflow in simplestring_addn
  + debian/patches/CVE-2016-6296.patch: prevent overflows in
ext/xmlrpc/libxmlrpc/simplestring.*.
  + CVE-2016-6296
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in php_stream_zip_opener
  + debian/patches/CVE-2016-6297.patch: use size_t in
ext/zip/zip_stream.c.
  + CVE-2016-6297
  [ Fixed in 7.0.9 ]
- debian/patches/fix_exif_tests.patch: fix exif test results after
  security changes.
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: denial of service or code execution via crafted
  serialized data
  + debian/patches/CVE-2016-7124.patch: fix unserializing logic in
ext/session/session.c, ext/standard/var_unserializer.c*,
ext/wddx/wddx.c, added tests to
ext/standard/tests/serialize/bug72663.phpt,
ext/standard/tests/serialize/bug72663_2.phpt,
ext/standard/tests/serialize/bug72663_3.phpt.
  + CVE-2016-7124
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: arbitrary-type session data injection
  + debian/patches/CVE-2016-7125.patch: consume data even if not storing
in ext/session/session.c, added test to
ext/session/tests/bug72681.phpt.
  + CVE-2016-7125
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution in
  imagegammacorrect function
  + debian/patches/CVE-2016-7127.patch: check gamma values in
ext/gd/gd.c, added test to ext/gd/tests/bug72730.phpt.
  + CVE-2016-7127
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: information disclosure via exif_process_IFD_in_TIFF
  + debian/patches/CVE-2016-7128.patch: properly handle thumbnails in
ext/exif/exif.c.
  + CVE-2016-7128
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  invalid ISO 8601 time value
  + debian/patches/CVE-2016-7129.patch: properly handle strings in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72749.phpt.
  + CVE-2016-7129
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  invalid base64 binary value
  + debian/patches/CVE-2016-7130.patch: properly handle string in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72750.phpt.
  + CVE-2016-7130
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  malformed wddxPacket XML document
  + debian/patches/CVE-2016-7131.patch: added checks to ext/wddx/wddx.c,
added tests to ext/wddx/tests/bug72790.phpt,
ext/wddx/tests/bug72799.phpt.
  + CVE-2016-7131
  + CVE-2016-7132
  [ Fixed in 7.0.10 ]
- 

[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-11 Thread Launchpad Bug Tracker
This bug was fixed in the package php7.0 - 7.0.13-0ubuntu0.16.04.1

---
php7.0 (7.0.13-0ubuntu0.16.04.1) xenial; urgency=medium

  * New upstream release
- LP: #1645431
- Refresh patches for new upstream release.
  * Drop:
- SECURITY UPDATE: proxy request header vulnerability (httpoxy)
  + debian/patches/CVE-2016-5385.patch: only use HTTP_PROXY from the
local environment in ext/standard/basic_functions.c, main/SAPI.c,
main/php_variables.c.
  + CVE-2016-5385
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: inadequate error handling in bzread()
  + debian/patches/CVE-2016-5399.patch: do not allow reading past error
read in ext/bz2/bz2.c.
  + CVE-2016-5399
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in the virtual_file_ex function
  + debian/patches/CVE-2016-6289.patch: properly check path_length in
Zend/zend_virtual_cwd.c.
  + CVE-2016-6289
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free in unserialize() with unexpected
  session deserialization
  + debian/patches/CVE-2016-6290.patch: destroy var_hash properly in
ext/session/session.c, added test to ext/session/tests/bug72562.phpt.
  + CVE-2016-6290
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: out of bounds read in exif_process_IFD_in_MAKERNOTE
  + debian/patches/CVE-2016-6291.patch: add more bounds checks to
ext/exif/exif.c.
  + CVE-2016-6291
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: NULL pointer dereference in exif_process_user_comment
  + debian/patches/CVE-2016-6292.patch: properly handle encoding in
ext/exif/exif.c.
  + CVE-2016-6292
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: locale_accept_from_http out-of-bounds access
  + debian/patches/CVE-2016-6294.patch: check length in
ext/intl/locale/locale_methods.c, added test to
ext/intl/tests/bug72533.phpt.
  + CVE-2016-6294
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free vulnerability in SNMP with GC and
  unserialize()
  + debian/patches/CVE-2016-6295.patch: add new handler to
ext/snmp/snmp.c, add test to ext/snmp/tests/bug72479.phpt.
  + CVE-2016-6295
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: heap buffer overflow in simplestring_addn
  + debian/patches/CVE-2016-6296.patch: prevent overflows in
ext/xmlrpc/libxmlrpc/simplestring.*.
  + CVE-2016-6296
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in php_stream_zip_opener
  + debian/patches/CVE-2016-6297.patch: use size_t in
ext/zip/zip_stream.c.
  + CVE-2016-6297
  [ Fixed in 7.0.9 ]
- debian/patches/fix_exif_tests.patch: fix exif test results after
  security changes.
  [ Fixed in 7.0.9 ]
- SECURITY UPDATE: denial of service or code execution via crafted
  serialized data
  + debian/patches/CVE-2016-7124.patch: fix unserializing logic in
ext/session/session.c, ext/standard/var_unserializer.c*,
ext/wddx/wddx.c, added tests to
ext/standard/tests/serialize/bug72663.phpt,
ext/standard/tests/serialize/bug72663_2.phpt,
ext/standard/tests/serialize/bug72663_3.phpt.
  + CVE-2016-7124
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: arbitrary-type session data injection
  + debian/patches/CVE-2016-7125.patch: consume data even if not storing
in ext/session/session.c, added test to
ext/session/tests/bug72681.phpt.
  + CVE-2016-7125
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution in
  imagegammacorrect function
  + debian/patches/CVE-2016-7127.patch: check gamma values in
ext/gd/gd.c, added test to ext/gd/tests/bug72730.phpt.
  + CVE-2016-7127
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: information disclosure via exif_process_IFD_in_TIFF
  + debian/patches/CVE-2016-7128.patch: properly handle thumbnails in
ext/exif/exif.c.
  + CVE-2016-7128
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  invalid ISO 8601 time value
  + debian/patches/CVE-2016-7129.patch: properly handle strings in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72749.phpt.
  + CVE-2016-7129
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  invalid base64 binary value
  + debian/patches/CVE-2016-7130.patch: properly handle string in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72750.phpt.
  + CVE-2016-7130
  [ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
  malformed wddxPacket XML document
  + debian/patches/CVE-2016-7131.patch: added checks to ext/wddx/wddx.c,
added tests to ext/wddx/tests/bug72790.phpt,
ext/wddx/tests/bug72799.phpt.
  + CVE-2016-7131
  + CVE-2016-7132
  [ Fixed in 7.0.10 ]
- 

[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-10 Thread Nish Aravamudan
I apologize for not providing more details when I changed the tag a few
days ago! I tested by basic updating of PHP in X and Y containers from
the version in -updates to the version in -proposed, and verification
that simple scripts still continue to function.

I do not have a framework for more extensive testing of the PHP core,
but the above is similar to what I have tested in the past for
upstream/MRE updates.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-10 Thread Mathew Hodson
** Tags removed: bot-stop-nagging
** Tags added: upgrade-software-version

** Changed in: php7.0 (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-06 Thread Nish Aravamudan
** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2017-01-03 Thread Nish Aravamudan
** Tags added: bot-stop-nagging

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2016-12-02 Thread Nish Aravamudan
** Tags removed: verification-failed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2016-12-01 Thread Nish Aravamudan
Just as a quick note, I tested both a X and Y LXD environment, with php
installed, and the upgrade went smoothly. I will hold off on marking
verification-done for a bit, so I can do some more testing.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2016-12-01 Thread Brian Murray
Hello Nish, or anyone else affected,

Accepted php7.0 into yakkety-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/php7.0/7.0.13-0ubuntu0.16.10.1 in a
few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: php7.0 (Ubuntu Yakkety)
   Status: In Progress => Fix Committed

** Tags added: verification-needed

** Changed in: php7.0 (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2016-11-30 Thread Nish Aravamudan
7.0.13-2ubuntu1 has migrated to zesty release.

** Changed in: php7.0 (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: php7.0 (Ubuntu)
 Assignee: Nish Aravamudan (nacc) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1645431] Re: [SRU] microrelease exception for src:php7.0 (7.0.13)

2016-11-28 Thread Nish Aravamudan
I just uploaded 7.0.13 to Zesty today.

** Changed in: php7.0 (Ubuntu)
 Assignee: (unassigned) => Nish Aravamudan (nacc)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1645431

Title:
  [SRU] microrelease exception for src:php7.0 (7.0.13)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1645431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs