[ubuntu/lucid-security] php5_5.3.2-1ubuntu4.10_powerpc_translations.tar.gz, php5_5.3.2-1ubuntu4.10_i386_translations.tar.gz, php5_5.3.2-1ubuntu4.10_ia64_translations.tar.gz, php5_5.3.2-1ubuntu4.10_sparc_translations.tar.gz, php5_5.3.2-1ubuntu4.10_amd64_translations.tar.gz, php5, php5_5.3.2-1ubuntu4.10_armel_translations.tar.gz 5.3.2-1ubuntu4.10 (Accepted)
Steve Beattie
sbeattie at ubuntu.com
Mon Oct 17 22:06:19 UTC 2011
php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
- CVE-2011-2202
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
[ Steve Beattie ]
* SECURITY UPDATE: DoS in zip handling due to addGlob() crashing
on invalid flags
- debian/patches/php5-CVE-2011-1657.patch: check for valid flags
- CVE-2011-1657
* SECURITY UPDATE: crypt_blowfish doesn't properly handle 8-bit
(non-ascii) passwords leading to a smaller collision space
- debian/patches/php5-CVE-2011-2483.patch: update crypt_blowfish
to 1.2 to correct handling of passwords containing 8-bit
(non-ascii) characters.
CVE-2011-2483
* SECURITY UPDATE: DoS due to failure to check for memory allocation errors
- debian/patches/php5-CVE-2011-3182.patch: check the return values
of the malloc, calloc, and realloc functions
- CVE-2011-3182
* SECURITY UPDATE: DoS in errorlog() when passed NULL
- debian/patches/php5-CVE-2011-3267.patch: fix NULL pointer crash in
errorlog()
- CVE-2011-3267
* SECURITY UPDATE: information leak via handler interrupt (LP: #852871)
- debian/patches/php5-CVE-2010-1914.patch: grab references before
calling zendi_convert_to_long()
- CVE-2010-1914
Date: Fri, 14 Oct 2011 14:24:59 -0700
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/php5/5.3.2-1ubuntu4.10
-------------- next part --------------
Format: 1.8
Date: Fri, 14 Oct 2011 14:24:59 -0700
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.2-1ubuntu4.10
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (metapackage)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dbg - Debug symbols for PHP5
php5-dev - Files for PHP5 module development
php5-enchant - Enchant module for php5
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-intl - internationalisation module for php5
php5-ldap - LDAP module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Launchpad-Bugs-Fixed: 813110 813115 852871
Changes:
php5 (5.3.2-1ubuntu4.10) lucid-security; urgency=low
.
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/php5-CVE-2011-2202.patch:
- CVE-2011-2202
* SECURITY UPDATE: Fixed stack buffer overflow in socket_connect()
(LP: #813110)
- debian/patches/php5-CVE-2011-1938.patch:
- CVE-2011-1938
.
[ Steve Beattie ]
* SECURITY UPDATE: DoS in zip handling due to addGlob() crashing
on invalid flags
- debian/patches/php5-CVE-2011-1657.patch: check for valid flags
- CVE-2011-1657
* SECURITY UPDATE: crypt_blowfish doesn't properly handle 8-bit
(non-ascii) passwords leading to a smaller collision space
- debian/patches/php5-CVE-2011-2483.patch: update crypt_blowfish
to 1.2 to correct handling of passwords containing 8-bit
(non-ascii) characters.
CVE-2011-2483
* SECURITY UPDATE: DoS due to failure to check for memory allocation errors
- debian/patches/php5-CVE-2011-3182.patch: check the return values
of the malloc, calloc, and realloc functions
- CVE-2011-3182
* SECURITY UPDATE: DoS in errorlog() when passed NULL
- debian/patches/php5-CVE-2011-3267.patch: fix NULL pointer crash in
errorlog()
- CVE-2011-3267
* SECURITY UPDATE: information leak via handler interrupt (LP: #852871)
- debian/patches/php5-CVE-2010-1914.patch: grab references before
calling zendi_convert_to_long()
- CVE-2010-1914
Checksums-Sha1:
d9595b449b53075dbce73d04acf8e34b03449af5 3170 php5_5.3.2-1ubuntu4.10.dsc
14b934be8482d0c0395deb42db6eb68f6af69f45 238414 php5_5.3.2-1ubuntu4.10.diff.gz
Checksums-Sha256:
139a82111930dfcab8970c7701211dda534b2f531b6653aa7e7a448669f89e46 3170 php5_5.3.2-1ubuntu4.10.dsc
f943274ceaa56a25415dde581725b3801a80757fb9d4f8a5a3ce9a4847c5e443 238414 php5_5.3.2-1ubuntu4.10.diff.gz
Files:
a1055bb9affd1280f0b09967e05c7d5c 3170 php optional php5_5.3.2-1ubuntu4.10.dsc
99121473f65f497b719135adab159d95 238414 php optional php5_5.3.2-1ubuntu4.10.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
More information about the Lucid-changes
mailing list