[ubuntu/focal-proposed] php7.4 7.4.3-4ubuntu2 (Accepted)

Leonidas S. Barbosa leo.barbosa at canonical.com
Thu Apr 16 20:43:29 UTC 2020


php7.4 (7.4.3-4ubuntu2) focal; urgency=medium

  * SECURITY UPDATE: Read one byte of uninitialized memory
    - debian/patches/CVE-2020-7064.patch: check length in
      exif_process_TIFF_in_JPEG to avoid read uninitialized memory
      ext/exif/exif.c, ext/exif/tests/bug79282.phpt.
    - CVE-2020-7064
  * SECURITY UPDATE: Memory corruption, crash and potentially code execution
    - debian/patches/CVE-2020-7065.patch: make sure that negative values are
      properly compared in ext/mbstring/php_unicode.c,
      ext/mbstring/tests/bug70371.phpt.
    - CVE-2020-7065
  * SECURITY UPDATE: Truncated url due \0
    - debian/patches/CVE-2020-7066.patch: check for get_headers
      not accepting \0 in ext/standard/url.c.
    - CVE-2020-7066

Date: Mon, 13 Apr 2020 09:32:06 -0300
Changed-By: leo.barbosa at canonical.com (Leonidas S. Barbosa)
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2
-------------- next part --------------
Format: 1.8
Date: Mon, 13 Apr 2020 09:32:06 -0300
Source: php7.4
Architecture: source
Version: 7.4.3-4ubuntu2
Distribution: focal
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Leonidas S. Barbosa <leo.barbosa at canonical.com>
Changes:
 php7.4 (7.4.3-4ubuntu2) focal; urgency=medium
 .
   * SECURITY UPDATE: Read one byte of uninitialized memory
     - debian/patches/CVE-2020-7064.patch: check length in
       exif_process_TIFF_in_JPEG to avoid read uninitialized memory
       ext/exif/exif.c, ext/exif/tests/bug79282.phpt.
     - CVE-2020-7064
   * SECURITY UPDATE: Memory corruption, crash and potentially code execution
     - debian/patches/CVE-2020-7065.patch: make sure that negative values are
       properly compared in ext/mbstring/php_unicode.c,
       ext/mbstring/tests/bug70371.phpt.
     - CVE-2020-7065
   * SECURITY UPDATE: Truncated url due \0
     - debian/patches/CVE-2020-7066.patch: check for get_headers
       not accepting \0 in ext/standard/url.c.
     - CVE-2020-7066
Checksums-Sha1:
 7f2e5f35b595291aeba7ab45c9f27cdfa0c23f6a 5604 php7.4_7.4.3-4ubuntu2.dsc
 d443934b6707c6461a7f4c91d6f0a82068e2091e 66684 php7.4_7.4.3-4ubuntu2.debian.tar.xz
 b1fca71adce526868b638f65e6f8166250256b04 14850 php7.4_7.4.3-4ubuntu2_source.buildinfo
Checksums-Sha256:
 092dd059a76644c2d3673e92cbe8f09073dd600b4995aabb5ff6518af729c98d 5604 php7.4_7.4.3-4ubuntu2.dsc
 60af7906f0410830223b21ab0b20b43e19e61720e3230dbc813d7ba78e7d7568 66684 php7.4_7.4.3-4ubuntu2.debian.tar.xz
 b2553b08230416d4cfb7c223d802fd447ef14d79152a57088e1f5932df398449 14850 php7.4_7.4.3-4ubuntu2_source.buildinfo
Files:
 2f6c0588334bea5d87fd568c36ad0041 5604 php optional php7.4_7.4.3-4ubuntu2.dsc
 388f141f741f4c62d587bd101d3eafe9 66684 php optional php7.4_7.4.3-4ubuntu2.debian.tar.xz
 b72959ad23ea06c67bc47959868daf92 14850 php optional php7.4_7.4.3-4ubuntu2_source.buildinfo
Original-Maintainer: Debian PHP Maintainers <team+pkg-php at tracker.debian.org>


More information about the Focal-changes mailing list