This bug was fixed in the package php5 - 5.3.5-1ubuntu7.3
---
php5 (5.3.5-1ubuntu7.3) natty-security; urgency=low
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
This bug was fixed in the package php5 - 5.3.3-1ubuntu9.6
---
php5 (5.3.3-1ubuntu9.6) maverick-security; urgency=low
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
-
This bug was fixed in the package php5 - 5.3.2-1ubuntu4.10
---
php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
Unsubscribing ubuntu-security-sponsors since Steve is handling this as
part of his update.
** Changed in: php5 (Ubuntu Lucid)
Status: Confirmed = In Progress
** Changed in: php5 (Ubuntu Lucid)
Assignee: (unassigned) = Steve Beattie (sbeattie)
** Changed in: php5 (Ubuntu Maverick)
** Changed in: php5 (Ubuntu Lucid)
Status: Confirmed = In Progress
** Changed in: php5 (Ubuntu Lucid)
Assignee: (unassigned) = Angel Abad (angelabad)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
** Changed in: php5 (Ubuntu Maverick)
Status: Confirmed = In Progress
** Changed in: php5 (Ubuntu Maverick)
Assignee: (unassigned) = Angel Abad (angelabad)
** Changed in: php5 (Ubuntu Natty)
Status: Confirmed = In Progress
** Changed in: php5 (Ubuntu Natty)
Assignee:
php5 (5.3.3-1ubuntu9.6) maverick-security; urgency=low
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
-- Angel Abad angela...@ubuntu.com Tue, 20 Sep 2011 23:14:11 +0200
** Patch added:
php5 (5.3.5-1ubuntu7.3) natty-security; urgency=low
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
-- Angel Abad angela...@ubuntu.com Tue, 20 Sep 2011 23:22:13 +0200
** Patch added:
php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
-- Angel Abad angela...@ubuntu.com Tue, 20 Sep 2011 23:02:17 +0200
** Patch added:
Fixed in 5.3.6-13ubuntu1 upload.
** Changed in: php5 (Ubuntu Oneiric)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/813110
Title:
** Also affects: php5 (Ubuntu Lucid)
Importance: Undecided
Status: New
** Also affects: php5 (Ubuntu Maverick)
Importance: Undecided
Status: New
** Also affects: php5 (Ubuntu Oneiric)
Importance: Undecided
Status: New
** Also affects: php5 (Ubuntu Natty)
11 matches
Mail list logo