[ubuntu/jaunty-security] php5_5.2.6.dfsg.1-3ubuntu4.5_lpia_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_amd64_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_powerpc_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_ia64_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_armel_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_sparc_translations.tar.gz (delayed), php5, php5_5.2.6.dfsg.1-3ubuntu4.5_i386_translations.tar.gz, php5_5.2.6.dfsg.1-3ubuntu4.5_hppa_translations.tar.gz 5.2.6.dfsg.1-3ubuntu4.5 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Wed Jan 13 15:04:19 GMT 2010
php5 (5.2.6.dfsg.1-3ubuntu4.5) jaunty-security; urgency=low
* SECURITY UPDATE: information disclosure and denial of service via
zend_restore_ini_entry_cb function.
- debian/patches/CVE-2009-2626.patch: make sure new_value exists in
main/main.c, gracefully handle failure in Zend/zend_ini.c.
- CVE-2009-2626
* SECURITY UPDATE: Cross-site scripting via incomplete htmlspecialchars
filtering
- debian/patches/CVE-2009-4142.patch: rewrite handling logic in
ext/standard/html.c, add ext/standard/tests/strings/bug49785.phpt
test script, fix ext/standard/tests/strings/htmlentities-utf.phpt
test script.
- CVE-2009-4142
* SECURITY UPDATE: restrictions bypass via incorrect session data
handling
- debian/patches/CVE-2009-4143.patch: protect from interrupt
corruption in ext/session/session.c.
- CVE-2009-4143
Date: Wed, 06 Jan 2010 08:18:02 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/php5/5.2.6.dfsg.1-3ubuntu4.5
-------------- next part --------------
Format: 1.8
Date: Wed, 06 Jan 2010 08:18:02 -0500
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-dev php5-dbg php-pear php5-curl php5-gd php5-gmp php5-ldap php5-mhash php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.2.6.dfsg.1-3ubuntu4.5
Distribution: jaunty-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (metapackage)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dbg - Debug symbols for PHP5
php5-dev - Files for PHP5 module development
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-ldap - LDAP module for php5
php5-mhash - MHASH module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Changes:
php5 (5.2.6.dfsg.1-3ubuntu4.5) jaunty-security; urgency=low
.
* SECURITY UPDATE: information disclosure and denial of service via
zend_restore_ini_entry_cb function.
- debian/patches/CVE-2009-2626.patch: make sure new_value exists in
main/main.c, gracefully handle failure in Zend/zend_ini.c.
- CVE-2009-2626
* SECURITY UPDATE: Cross-site scripting via incomplete htmlspecialchars
filtering
- debian/patches/CVE-2009-4142.patch: rewrite handling logic in
ext/standard/html.c, add ext/standard/tests/strings/bug49785.phpt
test script, fix ext/standard/tests/strings/htmlentities-utf.phpt
test script.
- CVE-2009-4142
* SECURITY UPDATE: restrictions bypass via incorrect session data
handling
- debian/patches/CVE-2009-4143.patch: protect from interrupt
corruption in ext/session/session.c.
- CVE-2009-4143
Checksums-Sha1:
a10f9af01c4131601518a3bd5c67d38f48434337 2542 php5_5.2.6.dfsg.1-3ubuntu4.5.dsc
ec3781ddb0fa35fd670017d650c09f1579ee945a 202398 php5_5.2.6.dfsg.1-3ubuntu4.5.diff.gz
Checksums-Sha256:
6ecf877c5e47e9b432b2b944d5650edb2e9922d6bec0e45fd2f84e3d97fe2f3d 2542 php5_5.2.6.dfsg.1-3ubuntu4.5.dsc
6296c0e54e6a44a5cfff20cacc0cbf61df253b658fd5f52bc7b2d6151f582cb5 202398 php5_5.2.6.dfsg.1-3ubuntu4.5.diff.gz
Files:
eb7bd63ce59aa413680b9f10019c9c71 2542 web optional php5_5.2.6.dfsg.1-3ubuntu4.5.dsc
289888bc1dab7cd4febdd64b428a3f57 202398 web optional php5_5.2.6.dfsg.1-3ubuntu4.5.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
More information about the Jaunty-changes
mailing list