Accepted php4 4:4.4.2-1 (source)

Adam Conrad adconrad at 0c3.net
Wed Jan 18 19:30:04 GMT 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Origin: Debian/incoming
Format: 1.7
Date: Wed,  18 Jan 2006 19:28:31 +0000
Source: php4
Binary: php4-xslt, php4-dev, libapache2-mod-php4, php4-domxml, php4-recode, php4-cli, php4-ldap, php4-pgsql, libapache-mod-php4, php4-gd, php4, php4-common, php4-mcal, php4-odbc, php4-mhash, php4-sybase, php4-cgi, php4-curl, php4-snmp, php4-pear, php4-mysql
Architecture: source
Version: 4:4.4.2-1
Distribution: dapper
Urgency: low
Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
Changed-By: Adam Conrad <adconrad at 0c3.net>
Description: 
 php4       - server-side, HTML-embedded scripting language (meta-package)
Closes: 336004 336645 339577 341726 343399 343791
Changes: 
 php4 (4:4.4.2-1) unstable; urgency=low
 .
   * New upstream bugfix release, skipping the problematic 4.4.1 release:
     - Remove some PEAR cruft from 006-debian_quirks.patch, since we don't
       build PEAR from php4 anymore, and it conflicted with upstream diffs.
     - Remove 054-open_basedir_slash.patch, now integrated upstream.
     - Remove 055-gd_safe_mode_checks.patch, fixed differently upstream.
   * Many security vulns fixed (closes: #336645, #339577, #336004, #341726):
     - Fixes multiple cross-site-scripting vulnerabilities; CVE-2006-0208
     - Resolves multiple HTTP response splitting vulnerabilities, allowing
       arbitrary header injection via Set-Cookie headers; see CVE-2006-0207
     - Resolves a local denial of service in the apache2 SAPI, which can
       be triggered by using session.save_path in .htaccess; CVE-2005-3319
     - Resolves an infinite loop in the exif_read_data function which can
       be triggered with a specially-crafted JPEG image; CVE-2005-3353
     - Resolves an XSS vulnerability in the phpinfo function; CVE-2005-3388
     - Resolves a vulnerability in the parse_str function whereby a remote
       attacker can fool PHP into turning on register_globals, thus making
       applications vulnerable to global variable injections; CVE-2005-3389
     - Resolves a vulnerability in the RFC1867 file upload feature where, if
       register_globals is enabled, a remote attacker can modify the GLOBALS
       array with a multipart/form-data POST request; see CVE-2005-3390
     - Resolves numerous safe_mode and open_basedir bypasses; CVE-2005-3391
     - Resolves INI settings leaks in the apache2 SAPI, leading to safe_mode
       and open_basedir bypasses between virtual hosts; CVE-2005-3392
     - Resolves a CRLF injection vulnerability in the mb_send_mail function,
       allowing injection of arbitrary mail headers; see CVE-2005-3883
   * Bump libdb build-dep from 4.2 to 4.3, matching apache (closes: #343399)
   * Bump our MySQL build-dep to 5.0's libmysqlclient15-dev (closes: #343791)
   * Automate the process of getting the list of built-in modules into the
     package descriptions, so it stays fresh in the future (see: #341867)
   * Create 056-mime_magic_strings.patch, making the mime_magic extension
     more liberal about what mime-types is accepts, as well as making it skip
     over ones it dislikes, rather than disabling itself (see: #335674)
   * Add 057-no_apache_installed.patch, to stop spewing a mess of errors in
     configure because we don't have the apache binaries in the build chroot.
   * Fix small typo in the php4-xslt package description (see: #344816)
Files: 
 34f22a7d636ee5633e9d4bf1f359f700 98122 web optional php4_4.4.2-1.diff.gz
 a7ae7ed8f2edf1592bd94eab91c634fa 5461440 web optional php4_4.4.2.orig.tar.gz
 c30822bc794b738318164dce3cbd2813 1791 web optional php4_4.4.2-1.dsc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iQEVAwUBQ86W3wF4adwMEr3XAQKKxwgAj7b/dm/z/QGoUMzduXl5GUD+uAkj0RHO
Qzm2J1IRc5puZiyFDsw9no4LGo1EU8SeK/yRbqxA7rPDbmddmBvhslHFZF11/W02
vdjMEdBq++3hiCZxwsLTuFMVcF2aG8TyfPOLA1Y8YykuIRJ739KymJg4tEhbaFVr
Wmv5/+wqcsACDp+J0+Lcy23Nc+r1PQ3Lzp0ulR5rP7OeqsLs3GX2Kag5LCu9nLOB
sbTz7BRZ464nRaTQLu0dXPFHFpvKLsi3IdTdBrloW3zOt/LOvcjofJdd0iic0tew
Y9VZGsUgitgl1emUBDl+QSMWvw2JYLEmad6yWlfVF+db2QiMMzL9KQ==
=p9ir
-----END PGP SIGNATURE-----


Accepted:
php4_4.4.2-1.diff.gz
  to pool/universe/p/php4/php4_4.4.2-1.diff.gz
php4_4.4.2-1.dsc
  to pool/universe/p/php4/php4_4.4.2-1.dsc
php4_4.4.2.orig.tar.gz
  to pool/universe/p/php4/php4_4.4.2.orig.tar.gz




More information about the dapper-changes mailing list