[ubuntu/vivid-proposed] php5 5.6.4+dfsg-4ubuntu3 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Mar 17 15:54:14 UTC 2015


php5 (5.6.4+dfsg-4ubuntu3) vivid; urgency=medium

  * SECURITY UPDATE: denial of service or possible code execution in
    enchant
    - debian/patches/CVE-2014-9705.patch: handle position better in
      ext/enchant/enchant.c.
    - CVE-2014-9705
  * SECURITY UPDATE: arbitrary code execution via use after free in
    unserialize() with DateTimeZone and DateTime
    - debian/patches/CVE-2015-0273.patch: fix use after free in
      ext/date/php_date.c, added tests to ext/date/tests/bug68942.phpt,
      ext/date/tests/bug68942_2.phpt.
    - CVE-2015-0273
  * SECURITY UPDATE: denial of service or possible code execution in phar
    - debian/patches/CVE-2015-2301.patch: fix use after free in
      ext/phar/phar_object.c.
    - CVE-2015-2301

Date: Mon, 16 Mar 2015 13:21:17 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu3
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 16 Mar 2015 13:21:17 -0400
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-phpdbg php5-fpm libphp5-embed php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-readline php5-mysql php5-mysqlnd php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.6.4+dfsg-4ubuntu3
Distribution: vivid
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 libphp5-embed - HTML-embedded scripting language (Embedded SAPI library)
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mysql - MySQL module for php5
 php5-mysqlnd - MySQL module for php5 (Native Driver)
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-phpdbg - server-side, HTML-embedded scripting language (PHPDBG binary)
 php5-pspell - pspell module for php5
 php5-readline - Readline module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Changes:
 php5 (5.6.4+dfsg-4ubuntu3) vivid; urgency=medium
 .
   * SECURITY UPDATE: denial of service or possible code execution in
     enchant
     - debian/patches/CVE-2014-9705.patch: handle position better in
       ext/enchant/enchant.c.
     - CVE-2014-9705
   * SECURITY UPDATE: arbitrary code execution via use after free in
     unserialize() with DateTimeZone and DateTime
     - debian/patches/CVE-2015-0273.patch: fix use after free in
       ext/date/php_date.c, added tests to ext/date/tests/bug68942.phpt,
       ext/date/tests/bug68942_2.phpt.
     - CVE-2015-0273
   * SECURITY UPDATE: denial of service or possible code execution in phar
     - debian/patches/CVE-2015-2301.patch: fix use after free in
       ext/phar/phar_object.c.
     - CVE-2015-2301
Checksums-Sha1:
 eed21500664bdf2d6403711c3632efef9996c466 4767 php5_5.6.4+dfsg-4ubuntu3.dsc
 c81fc43086a5697f7a60c5263e050d4eaa83a788 140592 php5_5.6.4+dfsg-4ubuntu3.debian.tar.xz
Checksums-Sha256:
 2ca77f4564f35ea8737d8a92fc64ba466f195ffc03201ee6b68fa6e4999fee75 4767 php5_5.6.4+dfsg-4ubuntu3.dsc
 2d763a4d425fbcb1f51ab158c3b10ad828c648e84ee79649e00fd50aef69c6b2 140592 php5_5.6.4+dfsg-4ubuntu3.debian.tar.xz
Files:
 2339ecc92f82b025ceadb54a6b886200 4767 php optional php5_5.6.4+dfsg-4ubuntu3.dsc
 d1210ed5518978c8b8b639c8cf0eec47 140592 php optional php5_5.6.4+dfsg-4ubuntu3.debian.tar.xz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=59wa
-----END PGP SIGNATURE-----


More information about the Vivid-changes mailing list