[ubuntu/hardy-security] php5_5.2.4-2ubuntu5.22_hppa_translations.tar.gz, php5_5.2.4-2ubuntu5.22_powerpc_translations.tar.gz, php5_5.2.4-2ubuntu5.22_lpia_translations.tar.gz, php5_5.2.4-2ubuntu5.22_sparc_translations.tar.gz, php5, php5_5.2.4-2ubuntu5.22_ia64_translations.tar.gz, php5_5.2.4-2ubuntu5.22_i386_translations.tar.gz, php5_5.2.4-2ubuntu5.22_amd64_translations.tar.gz 5.2.4-2ubuntu5.22 (Accepted)
Steve Beattie
sbeattie at ubuntu.com
Thu Feb 9 22:35:38 UTC 2012
- Previous message: [ubuntu/hardy-security] openssl_0.9.8g-4ubuntu3.15_ia64_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_lpia_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_amd64_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_powerpc_translations.tar.gz, openssl, openssl_0.9.8g-4ubuntu3.15_hppa_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_sparc_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_i386_translations.tar.gz 0.9.8g-4ubuntu3.15 (Accepted)
- Next message: [ubuntu/hardy-security] pdns, pdns_2.9.21-5ubuntu1.2_ia64_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_lpia_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_amd64_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_hppa_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_powerpc_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_i386_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_sparc_translations.tar.gz 2.9.21-5ubuntu1.2 (Accepted)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
php5 (5.2.4-2ubuntu5.22) hardy-security; urgency=low
* SECURITY UPDATE: memory allocation failure denial of service
- debian/patches/php5-CVE-2011-4153.patch: check result of
zend_strdup() and calloc() for failed allocations
- CVE-2011-4153
* SECURITY UPDATE: predictable hash collision denial of service
- debian/patches/php5-CVE-2011-4885.patch: add max_input_vars
directive with default limit of 1000
- ATTENTION: this update changes previous php5 behavior by
limiting the number of external input variables to 1000.
This may be increased by adding a "max_input_vars"
directive to the php.ini configuration file. See
http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars
for more information.
- CVE-2011-4885
* SECURITY UPDATE: remote code execution vulnerability introduced by
the fix for CVE-2011-4885
- debian/patches/php5-CVE-2012-0830.patch: return rather than
continuing if max_input_vars limit is reached
- CVE-2012-0830
* SECURITY UPDATE: XSLT arbitrary file overwrite attack
- debian/patches/php5-CVE-2012-0057.patch: add xsl.security_prefs
ini option to define forbidden operations within XSLT stylesheets
- CVE-2012-0057
* SECURITY UPDATE: PDORow session denial of service
- debian/patches/php5-CVE-2012-0788.patch: fail gracefully when
attempting to serialize PDORow instances
- CVE-2012-0788
* SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
- debian/patches/php5-CVE-2012-0831.patch: always restore
magic_quote_gpc on request shutdown
- CVE-2012-0831
Date: Wed, 08 Feb 2012 17:31:25 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/hardy/+source/php5/5.2.4-2ubuntu5.22
-------------- next part --------------
Format: 1.7
Date: Wed, 08 Feb 2012 17:31:25 -0800
Source: php5
Binary: php5 php5-common libapache2-mod-php5 php5-cgi php5-cli php5-dev php-pear php5-curl php5-gd php5-gmp php5-ldap php5-mhash php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.2.4-2ubuntu5.22
Distribution: hardy-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (apache 2 module)
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (meta-package)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dev - Files for PHP5 module development
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-ldap - LDAP module for php5
php5-mhash - MHASH module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Changes:
php5 (5.2.4-2ubuntu5.22) hardy-security; urgency=low
.
* SECURITY UPDATE: memory allocation failure denial of service
- debian/patches/php5-CVE-2011-4153.patch: check result of
zend_strdup() and calloc() for failed allocations
- CVE-2011-4153
* SECURITY UPDATE: predictable hash collision denial of service
- debian/patches/php5-CVE-2011-4885.patch: add max_input_vars
directive with default limit of 1000
- ATTENTION: this update changes previous php5 behavior by
limiting the number of external input variables to 1000.
This may be increased by adding a "max_input_vars"
directive to the php.ini configuration file. See
http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars
for more information.
- CVE-2011-4885
* SECURITY UPDATE: remote code execution vulnerability introduced by
the fix for CVE-2011-4885
- debian/patches/php5-CVE-2012-0830.patch: return rather than
continuing if max_input_vars limit is reached
- CVE-2012-0830
* SECURITY UPDATE: XSLT arbitrary file overwrite attack
- debian/patches/php5-CVE-2012-0057.patch: add xsl.security_prefs
ini option to define forbidden operations within XSLT stylesheets
- CVE-2012-0057
* SECURITY UPDATE: PDORow session denial of service
- debian/patches/php5-CVE-2012-0788.patch: fail gracefully when
attempting to serialize PDORow instances
- CVE-2012-0788
* SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
- debian/patches/php5-CVE-2012-0831.patch: always restore
magic_quote_gpc on request shutdown
- CVE-2012-0831
Files:
5baa618053185ab8d9b48b08423de4f1 2607 web optional php5_5.2.4-2ubuntu5.22.dsc
cab43846935ca4c439175729e1641c70 199160 web optional php5_5.2.4-2ubuntu5.22.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
- Previous message: [ubuntu/hardy-security] openssl_0.9.8g-4ubuntu3.15_ia64_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_lpia_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_amd64_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_powerpc_translations.tar.gz, openssl, openssl_0.9.8g-4ubuntu3.15_hppa_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_sparc_translations.tar.gz, openssl_0.9.8g-4ubuntu3.15_i386_translations.tar.gz 0.9.8g-4ubuntu3.15 (Accepted)
- Next message: [ubuntu/hardy-security] pdns, pdns_2.9.21-5ubuntu1.2_ia64_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_lpia_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_amd64_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_hppa_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_powerpc_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_i386_translations.tar.gz, pdns_2.9.21-5ubuntu1.2_sparc_translations.tar.gz 2.9.21-5ubuntu1.2 (Accepted)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the Hardy-changes
mailing list