[Bug 227464] Re: PHP 5.2.6 fixes important security bugs
Dustin Kirkland
dustin.kirkland at gmail.com
Wed Jun 4 01:17:24 BST 2008
These are the security fixes as shown in the current changelog at:
http://www.php.net/ChangeLog-5.php
I chased down the CVS commit log messages against 5_2 for each of these.
Most of the fixes look relatively compact, with the exception of the
last, which is comparatively huge.
Version 5.2.6
01-May-2008
* Security Fixes
* Fixed possible stack buffer overflow in FastCGI SAPI.
(Andrei Nigmatulin)
* http://marc.info/?l=php-cvs&m=120721829703242&w=2
* Properly address incomplete multibyte chars inside
escapeshellcmd() (Ilia, Stefan Esser)
* http://marc.info/?l=php-cvs&m=120579496007399&w=2
* Fixed security issue detailed in CVE-2008-0599. (Rasmus)
* http://marc.info/?l=php-cvs&m=120415902925033&w=2
* Fixed a safe_mode bypass in cURL identified by
Maksymilian Arciemowicz. (Ilia)
* http://marc.info/?l=php-cvs&m=119963956428826&w=2
* Upgraded PCRE to version 7.6 (Nuno)
* http://marc.info/?l=php-cvs&m=120163838831816&w=2
* Note, this is a very LARGE patch
:-Dustin
--
PHP 5.2.6 fixes important security bugs
https://bugs.launchpad.net/bugs/227464
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in ubuntu.
More information about the Ubuntu-server-bugs
mailing list