[ubuntu/lucid-security] php5_5.3.2-1ubuntu4.13_sparc_translations.tar.gz, php5_5.3.2-1ubuntu4.13_amd64_translations.tar.gz, php5_5.3.2-1ubuntu4.13_powerpc_translations.tar.gz, php5_5.3.2-1ubuntu4.13_armel_translations.tar.gz, php5_5.3.2-1ubuntu4.13_i386_translations.tar.gz, php5, php5_5.3.2-1ubuntu4.13_ia64_translations.tar.gz 5.3.2-1ubuntu4.13 (Accepted)

Steve Beattie sbeattie at ubuntu.com
Thu Feb 9 22:34:21 UTC 2012


php5 (5.3.2-1ubuntu4.13) lucid-security; urgency=low

  * SECURITY UPDATE: memory allocation failure denial of service
    - debian/patches/php5-CVE-2011-4153.patch: check result of
      zend_strdup() and calloc() for failed allocations
    - CVE-2011-4153
  * SECURITY UPDATE: predictable hash collision denial of service
    (LP: #910296)
    - debian/patches/php5-CVE-2011-4885.patch: add max_input_vars
      directive with default limit of 1000
    - ATTENTION: this update changes previous php5 behavior by
      limiting the number of external input variables to 1000.
      This may be increased by adding a "max_input_vars"
      directive to the php.ini configuration file. See
      http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars
      for more information.
    - CVE-2011-4885
  * SECURITY UPDATE: remote code execution vulnerability introduced by
    the fix for CVE-2011-4885 (LP: #925772)
    - debian/patches/php5-CVE-2012-0830.patch: return rather than
      continuing if max_input_vars limit is reached
    - CVE-2012-0830
  * SECURITY UPDATE: XSLT arbitrary file overwrite attack
    - debian/patches/php5-CVE-2012-0057.patch: add xsl.security_prefs
      ini option to define forbidden operations within XSLT stylesheets
    - CVE-2012-0057
  * SECURITY UPDATE: PDORow session denial of service
    - debian/patches/php5-CVE-2012-0788.patch: fail gracefully when
      attempting to serialize PDORow instances
    - CVE-2012-0788
  * SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
    - debian/patches/php5-CVE-2012-0831.patch: always restore
      magic_quote_gpc on request shutdown
    - CVE-2012-0831
  * SECURITY UPDATE: arbitrary files removal via cronjob
    - debian/php5-common.php5.cron.d: take greater care when removing
      session files (overlooked in a previous update).
    - http://git.debian.org/?p=pkg-php%2Fphp.git;a=commitdiff_plain;h=d09fd04ed7bfcf7f008360c6a42025108925df09
    - CVE-2011-0441

Date: Wed, 08 Feb 2012 20:55:57 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/php5/5.3.2-1ubuntu4.13
-------------- next part --------------
Format: 1.8
Date: Wed, 08 Feb 2012 20:55:57 -0800
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.2-1ubuntu4.13
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description: 
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mysql - MySQL module for php5
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-pspell - pspell module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Launchpad-Bugs-Fixed: 910296 925772
Changes: 
 php5 (5.3.2-1ubuntu4.13) lucid-security; urgency=low
 .
   * SECURITY UPDATE: memory allocation failure denial of service
     - debian/patches/php5-CVE-2011-4153.patch: check result of
       zend_strdup() and calloc() for failed allocations
     - CVE-2011-4153
   * SECURITY UPDATE: predictable hash collision denial of service
     (LP: #910296)
     - debian/patches/php5-CVE-2011-4885.patch: add max_input_vars
       directive with default limit of 1000
     - ATTENTION: this update changes previous php5 behavior by
       limiting the number of external input variables to 1000.
       This may be increased by adding a "max_input_vars"
       directive to the php.ini configuration file. See
       http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars
       for more information.
     - CVE-2011-4885
   * SECURITY UPDATE: remote code execution vulnerability introduced by
     the fix for CVE-2011-4885 (LP: #925772)
     - debian/patches/php5-CVE-2012-0830.patch: return rather than
       continuing if max_input_vars limit is reached
     - CVE-2012-0830
   * SECURITY UPDATE: XSLT arbitrary file overwrite attack
     - debian/patches/php5-CVE-2012-0057.patch: add xsl.security_prefs
       ini option to define forbidden operations within XSLT stylesheets
     - CVE-2012-0057
   * SECURITY UPDATE: PDORow session denial of service
     - debian/patches/php5-CVE-2012-0788.patch: fail gracefully when
       attempting to serialize PDORow instances
     - CVE-2012-0788
   * SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
     - debian/patches/php5-CVE-2012-0831.patch: always restore
       magic_quote_gpc on request shutdown
     - CVE-2012-0831
   * SECURITY UPDATE: arbitrary files removal via cronjob
     - debian/php5-common.php5.cron.d: take greater care when removing
       session files (overlooked in a previous update).
     - http://git.debian.org/?p=pkg-php%2Fphp.git;a=commitdiff_plain;h=d09fd04ed7bfcf7f008360c6a42025108925df09
     - CVE-2011-0441
Checksums-Sha1: 
 d1278dd3c33e4e105e6624c5fd747d83a98379c0 3170 php5_5.3.2-1ubuntu4.13.dsc
 29b0b0c036f3ecc66cbaf355a707c60982c77b83 245380 php5_5.3.2-1ubuntu4.13.diff.gz
Checksums-Sha256: 
 cab3eb0cc1523b0a738ba1670809ddcc292a1376619bffb2699730f725533cbd 3170 php5_5.3.2-1ubuntu4.13.dsc
 c8728c24d71d415eed090c02cdb48cf5459159048afb5e83792338ef5f66e662 245380 php5_5.3.2-1ubuntu4.13.diff.gz
Files: 
 7d88526c295b1e4a712f6a8b08b36258 3170 php optional php5_5.3.2-1ubuntu4.13.dsc
 c6afe83b22ac9587df870b89c4ab1bab 245380 php optional php5_5.3.2-1ubuntu4.13.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>


More information about the Lucid-changes mailing list