This bug was fixed in the package php5 - 5.3.2-1ubuntu4.18 --------------- php5 (5.3.2-1ubuntu4.18) lucid-security; urgency=low
* SECURITY UPDATE: HTTP response-splitting issue with %0D sequences - debian/patches/CVE-2011-1398.patch: properly handle %0D and NUL in main/SAPI.c, added tests to ext/standard/tests/*, fix test suite failures in ext/phar/phar_object.c. - CVE-2011-1398 - CVE-2012-4388 * SECURITY UPDATE: denial of service and possible code execution via _php_stream_scandir function (LP: #1028064) - debian/patches/CVE-2012-2688.patch: prevent overflow in main/streams/streams.c. - CVE-2012-2688 * SECURITY UPDATE: denial of service via PDO extension crafted parameter - debian/patches/CVE-2012-3450.patch: improve logic in ext/pdo/pdo_sql_parser.re, regenerate ext/pdo/pdo_sql_parser.c, add test to ext/pdo_mysql/tests/bug_61755.phpt. - CVE-2012-3450 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Wed, 12 Sep 2012 11:33:30 -0400 ** Changed in: php5 (Ubuntu Natty) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1028064 Title: potential overflow in _php_stream_scandir To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1028064/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs