[ubuntu/hardy-security] php5_5.2.4-2ubuntu5.13_hppa_translations.tar.gz, php5_5.2.4-2ubuntu5.13_powerpc_translations.tar.gz, php5_5.2.4-2ubuntu5.13_i386_translations.tar.gz, php5_5.2.4-2ubuntu5.13_ia64_translations.tar.gz, php5_5.2.4-2ubuntu5.13_lpia_translations.tar.gz, php5_5.2.4-2ubuntu5.13_amd64_translations.tar.gz, php5, php5_5.2.4-2ubuntu5.13_sparc_translations.tar.gz (delayed) 5.2.4-2ubuntu5.13 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Tue Jan 11 21:17:48 UTC 2011
php5 (5.2.4-2ubuntu5.13) hardy-security; urgency=low
* SECURITY UPDATE: overflow leading to xml decode bypass
- debian/patches/php5-CVE-2009-5016.patch: convert short to int to
prevent overflow in bit operations
- CVE-2009-5016
* SECURITY UPDATE: xml decode bypass
- debian/patches/php5-CVE-2010-3780.patch: improve utf8 decoding
- CVE-2010-3780
* SECURITY UPDATE: open_basedir bypass
- debian/patches/php5-CVE-2010-3436.patch: more strict checking in
php_check_specific_open_basedir()
- CVE-2010-3436
* SECURITY UPDATE: NULL pointer dereference crash
- debian/patches/php5-CVE-2010-3709.patch: check for NULL when
getting zip comment
- CVE-2010-3709
* SECURITY UPDATE: memory consumption denial of service
- debian/patches/php5-CVE-2010-3710.patch: check for email address
longer than RFC 2821 allows
- CVE-2010-3710
* SECURITY UPDATE: infinite loop/denial of service when dealing with
certain textual forms of MAX_FLOAT (LP: #697181)
- debian/patches/php5-CVE-2010-4645.patch: treat local doubles
as volatile to avoid x87 registers in zend_strtod()
- CVE-2010-4645
Date: Sat, 08 Jan 2011 06:52:44 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/hardy/+source/php5/5.2.4-2ubuntu5.13
-------------- next part --------------
Format: 1.7
Date: Sat, 08 Jan 2011 06:52:44 -0800
Source: php5
Binary: php5 php5-common libapache2-mod-php5 php5-cgi php5-cli php5-dev php-pear php5-curl php5-gd php5-gmp php5-ldap php5-mhash php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.2.4-2ubuntu5.13
Distribution: hardy-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (apache 2 module)
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (meta-package)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dev - Files for PHP5 module development
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-ldap - LDAP module for php5
php5-mhash - MHASH module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Launchpad-Bugs-Fixed: 697181
Changes:
php5 (5.2.4-2ubuntu5.13) hardy-security; urgency=low
.
* SECURITY UPDATE: overflow leading to xml decode bypass
- debian/patches/php5-CVE-2009-5016.patch: convert short to int to
prevent overflow in bit operations
- CVE-2009-5016
* SECURITY UPDATE: xml decode bypass
- debian/patches/php5-CVE-2010-3780.patch: improve utf8 decoding
- CVE-2010-3780
* SECURITY UPDATE: open_basedir bypass
- debian/patches/php5-CVE-2010-3436.patch: more strict checking in
php_check_specific_open_basedir()
- CVE-2010-3436
* SECURITY UPDATE: NULL pointer dereference crash
- debian/patches/php5-CVE-2010-3709.patch: check for NULL when
getting zip comment
- CVE-2010-3709
* SECURITY UPDATE: memory consumption denial of service
- debian/patches/php5-CVE-2010-3710.patch: check for email address
longer than RFC 2821 allows
- CVE-2010-3710
* SECURITY UPDATE: infinite loop/denial of service when dealing with
certain textual forms of MAX_FLOAT (LP: #697181)
- debian/patches/php5-CVE-2010-4645.patch: treat local doubles
as volatile to avoid x87 registers in zend_strtod()
- CVE-2010-4645
Files:
9efc7b0526b8067a1364304629818cbd 2612 web optional php5_5.2.4-2ubuntu5.13.dsc
a44e8c0fa732ae9fe40ef2f1e6307941 171074 web optional php5_5.2.4-2ubuntu5.13.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
More information about the Hardy-changes
mailing list