[ubuntu/oneiric] php5 5.3.6-13ubuntu1 (Accepted)
Chuck Short
zulcss at ubuntu.com
Mon Jul 25 15:25:21 UTC 2011
php5 (5.3.6-13ubuntu1) oneiric; urgency=low
* Merge from debian unstable. Remaining changes:
* Dropped firebird2.1-dev, libc-client-dev, libmcrypt-dev as it is in universe.
* Dropped libcurl-dev not in the archive.
* debian/control: replace build-depends on mysql-server with
mysql-server-core-5.1 and mysql-client-5.1 to avoid upstart and
mysql-server-5.1 postinst confusion with starting up multiple
mysqlds listening on the same port.
* Dropped php5-imap, php5-interbase, php5-mcrypt since we have versions
already in universe.
* Suggest php5-suhosin rather than recommends.
* Dropped libonig-dev and libqgdbm since its in universe. (libonig MIR
has been declined due to an inactive upstream. So this is probably
a permanent change).
* modulelist: Drop imap, interbase, sybase, and mcrypt.
* debian/rules:
* Dropped building of mcrypt, imap, and interbase.
* Install apport hook for php5.
* stop mysql instance on clean just in case we failed in tests
* debian/control: Recommend php5-dev for php-pear.
* debian/rules: --enable-pcntl for cgi as well.
* debian/patches/temporary-path-fixes-for-multiarch.patch: as a stopgap
for natty, patch the various config.m4 files for modules whose
libraries have moved to the multiarch dir; we can't use --with-libdir
yet because that requires all the build-deps to have moved. Thanks to
Jonathan Marsden for preparing this patch.
* debian/patches/fpm-config.patch: Update php-fpm.conf(pool.d/con)
to do initial chdir to / as suggest by Olaf van van der Spek
to detect early problems if php5-fpm needs a write access to
initial chdir.
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/php5-CVE-2011-1148.patch: improve reference
counting
- CVE-2011-1148
* debian/rules: set DEB_HOST_MULTIARCH to enable 'debian/rules' for
building.
php5 (5.3.6-13) unstable; urgency=low
* Fix CVE-2011-2483: 8-bit character mishandling allows different
password pairs to produce the same hash (Closes: #631347)
* Add support for $2x$ identifier as blowfish variant in crypt.c to
allow backward compatibility with old invalid hashes
* Return fail string (*0) on invalid Blowfish salt rounds
* Add NEWS item about incompatible blowfish hashes
* Fix CVE-2011-1938: Stack-based buffer overflow in the socket_connect
function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might
allow context-dependent attackers to execute arbitrary code via a
long pathname for a UNIX socket.
php5 (5.3.6-12) unstable; urgency=low
* Bump standards version to 3.9.2
* Update cron.d code to even safer variant (Courtesy of Bob Proulx)
* Small optimization in cron.d script (Courtesy of Marcus Cobden)
* Add firebird2.1-dev option to allow backports
* Pull (and fix broken patch) multiarch workaround from obuntu nattybuntu natty
Add error message when phpeze is not found (Closes: #627937)
* Enable pcntl extension for CGI builds (Closes: #627941), but
disable all pcntl functions by default
* File path injection vulnerability in RFC1867 File upload filename
[CVE-2011-2202]
Date: Mon, 25 Jul 2011 19:14:12 +0100
Changed-By: Chuck Short <zulcss at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/oneiric/+source/php5/5.3.6-13ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 25 Jul 2011 19:14:12 +0100
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-fpm php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-intl php5-ldap php5-mysql php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source
Version: 5.3.6-13ubuntu1
Distribution: oneiric
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Chuck Short <zulcss at ubuntu.com>
Description:
libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
php-pear - PEAR - PHP Extension and Application Repository
php5 - server-side, HTML-embedded scripting language (metapackage)
php5-cgi - server-side, HTML-embedded scripting language (CGI binary)
php5-cli - command-line interpreter for the php5 scripting language
php5-common - Common files for packages built from the php5 source
php5-curl - CURL module for php5
php5-dbg - Debug symbols for PHP5
php5-dev - Files for PHP5 module development
php5-enchant - Enchant module for php5
php5-fpm - server-side, HTML-embedded scripting language (FPM-CGI binary)
php5-gd - GD module for php5
php5-gmp - GMP module for php5
php5-intl - internationalisation module for php5
php5-ldap - LDAP module for php5
php5-mysql - MySQL module for php5
php5-odbc - ODBC module for php5
php5-pgsql - PostgreSQL module for php5
php5-pspell - pspell module for php5
php5-recode - recode module for php5
php5-snmp - SNMP module for php5
php5-sqlite - SQLite module for php5
php5-sybase - Sybase / MS SQL Server module for php5
php5-tidy - tidy module for php5
php5-xmlrpc - XML-RPC module for php5
php5-xsl - XSL module for php5
Closes: 627937 627941 631347
Changes:
php5 (5.3.6-13ubuntu1) oneiric; urgency=low
.
* Merge from debian unstable. Remaining changes:
* Dropped firebird2.1-dev, libc-client-dev, libmcrypt-dev as it is in universe.
* Dropped libcurl-dev not in the archive.
* debian/control: replace build-depends on mysql-server with
mysql-server-core-5.1 and mysql-client-5.1 to avoid upstart and
mysql-server-5.1 postinst confusion with starting up multiple
mysqlds listening on the same port.
* Dropped php5-imap, php5-interbase, php5-mcrypt since we have versions
already in universe.
* Suggest php5-suhosin rather than recommends.
* Dropped libonig-dev and libqgdbm since its in universe. (libonig MIR
has been declined due to an inactive upstream. So this is probably
a permanent change).
* modulelist: Drop imap, interbase, sybase, and mcrypt.
* debian/rules:
* Dropped building of mcrypt, imap, and interbase.
* Install apport hook for php5.
* stop mysql instance on clean just in case we failed in tests
* debian/control: Recommend php5-dev for php-pear.
* debian/rules: --enable-pcntl for cgi as well.
* debian/patches/temporary-path-fixes-for-multiarch.patch: as a stopgap
for natty, patch the various config.m4 files for modules whose
libraries have moved to the multiarch dir; we can't use --with-libdir
yet because that requires all the build-deps to have moved. Thanks to
Jonathan Marsden for preparing this patch.
* debian/patches/fpm-config.patch: Update php-fpm.conf(pool.d/con)
to do initial chdir to / as suggest by Olaf van van der Spek
to detect early problems if php5-fpm needs a write access to
initial chdir.
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/php5-CVE-2011-1148.patch: improve reference
counting
- CVE-2011-1148
* debian/rules: set DEB_HOST_MULTIARCH to enable 'debian/rules' for
building.
.
php5 (5.3.6-13) unstable; urgency=low
.
* Fix CVE-2011-2483: 8-bit character mishandling allows different
password pairs to produce the same hash (Closes: #631347)
* Add support for $2x$ identifier as blowfish variant in crypt.c to
allow backward compatibility with old invalid hashes
* Return fail string (*0) on invalid Blowfish salt rounds
* Add NEWS item about incompatible blowfish hashes
* Fix CVE-2011-1938: Stack-based buffer overflow in the socket_connect
function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might
allow context-dependent attackers to execute arbitrary code via a
long pathname for a UNIX socket.
.
php5 (5.3.6-12) unstable; urgency=low
.
* Bump standards version to 3.9.2
* Update cron.d code to even safer variant (Courtesy of Bob Proulx)
* Small optimization in cron.d script (Courtesy of Marcus Cobden)
* Add firebird2.1-dev option to allow backports
* Pull (and fix broken patch) multiarch workaround from obuntu nattybuntu natty
Add error message when phpeze is not found (Closes: #627937)
* Enable pcntl extension for CGI builds (Closes: #627941), but
disable all pcntl functions by default
* File path injection vulnerability in RFC1867 File upload filename
[CVE-2011-2202]
Checksums-Sha1:
c9f2b726fa461e139162ada061805d6220e9b00e 2622 php5_5.3.6-13ubuntu1.dsc
9a489a4156c7d921523bb3472d332c3b7610fd6b 203050 php5_5.3.6-13ubuntu1.diff.gz
Checksums-Sha256:
19656ca3ad823cf27fde9c3e239ef99a3d1b2841e4fa28c0da5ae75129a11bc9 2622 php5_5.3.6-13ubuntu1.dsc
0d5ee5ceb20c169ccab3fe028055086d3daa31e39f40858e049f8f92734e9c29 203050 php5_5.3.6-13ubuntu1.diff.gz
Files:
2c32a7c01f85bc459918536f7abbea2e 2622 php optional php5_5.3.6-13ubuntu1.dsc
a3afed35c46b99a83d1603ad1e4e2794 203050 php optional php5_5.3.6-13ubuntu1.diff.gz
Original-Maintainer: Debian PHP Maintainers <pkg-php-maint at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk4tfYAACgkQIHZ33voUATtxygCaArN5dkLPlo2uiUT+Bbkl0755
3Z4An3dmJ0a2DDWhbdbf7r6FWoRbuIhz
=n4HK
-----END PGP SIGNATURE-----
More information about the Oneiric-changes
mailing list