[ubuntu/wily-proposed] php5 5.6.11+dfsg-1ubuntu3 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Sep 29 15:22:17 UTC 2015


php5 (5.6.11+dfsg-1ubuntu3) wily; urgency=medium

  * SECURITY UPDATE: multiple use-after-free issues in unserialize()
    - debian/patches/CVE-2015-6831-1.patch: fix SPLArrayObject in
      ext/spl/spl_array.c, added test to ext/spl/tests/bug70166.phpt.
    - debian/patches/CVE-2015-6831-2.patch: fix SplObjectStorage in
      ext/spl/spl_observer.c, added test to ext/spl/tests/bug70168.phpt.
    - debian/patches/CVE-2015-6831-3.patch: fix SplDoublyLinkedList in
      ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70169.phpt.
    - CVE-2015-6831
  * SECURITY UPDATE: dangling pointer in the unserialization of ArrayObject
    items
    - debian/patches/CVE-2015-6832.patch: fix dangling pointer in
      ext/spl/spl_array.c, added test to ext/spl/tests/bug70068.phpt.
    - CVE-2015-6832
  * SECURITY UPDATE: phar files extracted outside of destination dir
    - debian/patches/CVE-2015-6833-1.patch: limit extracted files to given
      directory in ext/phar/phar_object.c.
    - debian/patches/CVE-2015-6833-2.patch: use emalloc in
      ext/phar/phar_object.c.
    - CVE-2015-6833
  * SECURITY UPDATE: multiple vulnerabilities in unserialize()
    - debian/patches/CVE-2015-6834-1.patch: fix use-after-free in
      ext/standard/var.c, ext/standard/var_unserializer.*.
    - debian/patches/CVE-2015-6834-2.patch: fix use-after-free in
      ext/spl/spl_observer.c, added test to ext/spl/tests/bug70365.phpt.
    - debian/patches/CVE-2015-6834-3.patch: fix use-after-free in
      ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70366.phpt.
    - CVE-2015-6834
  * SECURITY UPDATE: use after free in session deserializer
    - debian/patches/CVE-2015-6835-1.patch: fix use after free in
      ext/session/session.c, ext/standard/var_unserializer.*
      fixed tests in ext/session/tests/session_decode_error2.phpt,
      ext/session/tests/session_decode_variation3.phpt.
    - debian/patches/CVE-2015-6835-2.patch: add more fixes to
      ext/session/session.c.
    - CVE-2015-6835
  * SECURITY UPDATE: SOAP serialize_function_call() type confusion
    - debian/patches/CVE-2015-6836.patch: check type in ext/soap/soap.c,
      added test to ext/soap/tests/bug70388.phpt.
    - CVE-2015-6836
  * SECURITY UPDATE: NULL pointer dereference in XSLTProcessor class
    - debian/patches/CVE-2015-6837-6838.patch: fix logic in
      ext/xsl/xsltprocessor.c.
    - CVE-2015-6837
    - CVE-2015-6838

Date: Mon, 28 Sep 2015 07:26:44 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/php5/5.6.11+dfsg-1ubuntu3
-------------- next part --------------
Format: 1.8
Date: Mon, 28 Sep 2015 07:26:44 -0400
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-phpdbg php5-fpm libphp5-embed php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-readline php5-mysql php5-mysqlnd php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.6.11+dfsg-1ubuntu3
Distribution: wily
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 libphp5-embed - HTML-embedded scripting language (Embedded SAPI library)
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mysql - MySQL module for php5
 php5-mysqlnd - MySQL module for php5 (Native Driver)
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-phpdbg - server-side, HTML-embedded scripting language (PHPDBG binary)
 php5-pspell - pspell module for php5
 php5-readline - Readline module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Changes:
 php5 (5.6.11+dfsg-1ubuntu3) wily; urgency=medium
 .
   * SECURITY UPDATE: multiple use-after-free issues in unserialize()
     - debian/patches/CVE-2015-6831-1.patch: fix SPLArrayObject in
       ext/spl/spl_array.c, added test to ext/spl/tests/bug70166.phpt.
     - debian/patches/CVE-2015-6831-2.patch: fix SplObjectStorage in
       ext/spl/spl_observer.c, added test to ext/spl/tests/bug70168.phpt.
     - debian/patches/CVE-2015-6831-3.patch: fix SplDoublyLinkedList in
       ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70169.phpt.
     - CVE-2015-6831
   * SECURITY UPDATE: dangling pointer in the unserialization of ArrayObject
     items
     - debian/patches/CVE-2015-6832.patch: fix dangling pointer in
       ext/spl/spl_array.c, added test to ext/spl/tests/bug70068.phpt.
     - CVE-2015-6832
   * SECURITY UPDATE: phar files extracted outside of destination dir
     - debian/patches/CVE-2015-6833-1.patch: limit extracted files to given
       directory in ext/phar/phar_object.c.
     - debian/patches/CVE-2015-6833-2.patch: use emalloc in
       ext/phar/phar_object.c.
     - CVE-2015-6833
   * SECURITY UPDATE: multiple vulnerabilities in unserialize()
     - debian/patches/CVE-2015-6834-1.patch: fix use-after-free in
       ext/standard/var.c, ext/standard/var_unserializer.*.
     - debian/patches/CVE-2015-6834-2.patch: fix use-after-free in
       ext/spl/spl_observer.c, added test to ext/spl/tests/bug70365.phpt.
     - debian/patches/CVE-2015-6834-3.patch: fix use-after-free in
       ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70366.phpt.
     - CVE-2015-6834
   * SECURITY UPDATE: use after free in session deserializer
     - debian/patches/CVE-2015-6835-1.patch: fix use after free in
       ext/session/session.c, ext/standard/var_unserializer.*
       fixed tests in ext/session/tests/session_decode_error2.phpt,
       ext/session/tests/session_decode_variation3.phpt.
     - debian/patches/CVE-2015-6835-2.patch: add more fixes to
       ext/session/session.c.
     - CVE-2015-6835
   * SECURITY UPDATE: SOAP serialize_function_call() type confusion
     - debian/patches/CVE-2015-6836.patch: check type in ext/soap/soap.c,
       added test to ext/soap/tests/bug70388.phpt.
     - CVE-2015-6836
   * SECURITY UPDATE: NULL pointer dereference in XSLTProcessor class
     - debian/patches/CVE-2015-6837-6838.patch: fix logic in
       ext/xsl/xsltprocessor.c.
     - CVE-2015-6837
     - CVE-2015-6838
Checksums-Sha1:
 38a60bbe1b79e6b87e1db4360e33a7f61c59af77 4803 php5_5.6.11+dfsg-1ubuntu3.dsc
 2430c8f36e3bdf2a4cf91186117abea21340c674 140792 php5_5.6.11+dfsg-1ubuntu3.debian.tar.xz
Checksums-Sha256:
 7e395cd71e0494a9a9a513e6ee1846ea571253a181698420eb89bb134cb9d5bf 4803 php5_5.6.11+dfsg-1ubuntu3.dsc
 58846dee6e30dbc2d0bfdad4a07352cc35c7d56d17df9be5cbcb3446abd34616 140792 php5_5.6.11+dfsg-1ubuntu3.debian.tar.xz
Files:
 2f166141150d994cc15c277b772565ea 4803 php optional php5_5.6.11+dfsg-1ubuntu3.dsc
 82694e0572f243cb624ba09ab624776d 140792 php optional php5_5.6.11+dfsg-1ubuntu3.debian.tar.xz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>


More information about the Wily-changes mailing list