[ubuntu/maverick-security] php5_5.3.3-1ubuntu9.2_powerpc_translations.tar.gz (delayed), php5, php5_5.3.3-1ubuntu9.2_i386_translations.tar.gz, php5_5.3.3-1ubuntu9.2_amd64_translations.tar.gz, php5_5.3.3-1ubuntu9.2_armel_translations.tar.gz 5.3.3-1ubuntu9.2 (Accepted)

Ubuntu Installer archive at ubuntu.com
Tue Jan 11 21:16:13 UTC 2011


php5 (5.3.3-1ubuntu9.2) maverick-security; urgency=low

  * SECURITY UPDATE: open_basedir bypass
    - debian/patches/php5-CVE-2010-3436.patch: more strict checking in
      php_check_specific_open_basedir()
    - CVE-2010-3436
  * SECURITY UPDATE: NULL pointer dereference crash
    - debian/patches/php5-CVE-2010-3709.patch: check for NULL when
      getting zip comment
    - CVE-2010-3709
  * SECURITY UPDATE: memory consumption denial of service
    - debian/patches/php5-CVE-2010-3710.patch: check for email address
      longer than RFC 2821 allows
    - CVE-2010-3710
  * SECURITY UPDATE: xml decode bypass
    - debian/patches/php5-CVE-2010-3870.patch: improve utf8 decoding
    - CVE-2010-3870
  * SECURITY UPDATE: memory disclosure
    - debian/patches/php5-CVE-2010-4156.patch: check for excessive
      length in mb_strcut()
    - CVE-2010-4156
  * SECURITY UPDATE: integer overflow can cause an application crash
    - debian/patches/php5-CVE-2010-4409.patch: fix invalid args in
      NumberFormatter::getSymbol()
    - CVE-2010-4409
  * SECURITY UPDATE: infinite loop/denial of service when dealing with
    certain textual forms of MAX_FLOAT (LP: #697181)
    - debian/patches/php5-CVE-2010-4645.patch: treat local doubles
      as volatile to avoid x87 registers in zend_strtod()
    - CVE-2010-4645

Date: Wed, 05 Jan 2011 22:45:19 -0800
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/maverick/+source/php5/5.3.3-1ubuntu9.2
-------------- next part --------------
Format: 1.8
Date: Wed, 05 Jan 2011 22:45:19 -0800
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-fpm php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.3-1ubuntu9.2
Distribution: maverick-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Description: 
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mysql - MySQL module for php5
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-pspell - pspell module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Launchpad-Bugs-Fixed: 697181
Changes: 
 php5 (5.3.3-1ubuntu9.2) maverick-security; urgency=low
 .
   * SECURITY UPDATE: open_basedir bypass
     - debian/patches/php5-CVE-2010-3436.patch: more strict checking in
       php_check_specific_open_basedir()
     - CVE-2010-3436
   * SECURITY UPDATE: NULL pointer dereference crash
     - debian/patches/php5-CVE-2010-3709.patch: check for NULL when
       getting zip comment
     - CVE-2010-3709
   * SECURITY UPDATE: memory consumption denial of service
     - debian/patches/php5-CVE-2010-3710.patch: check for email address
       longer than RFC 2821 allows
     - CVE-2010-3710
   * SECURITY UPDATE: xml decode bypass
     - debian/patches/php5-CVE-2010-3870.patch: improve utf8 decoding
     - CVE-2010-3870
   * SECURITY UPDATE: memory disclosure
     - debian/patches/php5-CVE-2010-4156.patch: check for excessive
       length in mb_strcut()
     - CVE-2010-4156
   * SECURITY UPDATE: integer overflow can cause an application crash
     - debian/patches/php5-CVE-2010-4409.patch: fix invalid args in
       NumberFormatter::getSymbol()
     - CVE-2010-4409
   * SECURITY UPDATE: infinite loop/denial of service when dealing with
     certain textual forms of MAX_FLOAT (LP: #697181)
     - debian/patches/php5-CVE-2010-4645.patch: treat local doubles
       as volatile to avoid x87 registers in zend_strtod()
     - CVE-2010-4645
Checksums-Sha1: 
 c69d38d1e2e1c7af87fb0d41cdd2bba51e9f96b7 3246 php5_5.3.3-1ubuntu9.2.dsc
 c8ee406bfaa195623b42cf9d822ce44a9b76af6e 196816 php5_5.3.3-1ubuntu9.2.diff.gz
Checksums-Sha256: 
 756ca97d033912a54068ab9948c62b27f5b29704c0529752185f3f022b11cb1f 3246 php5_5.3.3-1ubuntu9.2.dsc
 a07355c715797c9e4fed0cc66e2beb00a7fcaae75c36bbf818d260a3a32b2251 196816 php5_5.3.3-1ubuntu9.2.diff.gz
Files: 
 8629ecc0b18d05ce19ddd8a6fd5c2be9 3246 php optional php5_5.3.3-1ubuntu9.2.dsc
 ede7dff78a1e215a0c478267c57dd1a8 196816 php optional php5_5.3.3-1ubuntu9.2.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>


More information about the Maverick-changes mailing list