[Bug 239513] Re: [SRU] stack smashing detected when calling xmlrpc_set_type
Launchpad Bug Tracker
239513 at bugs.launchpad.net
Thu Nov 26 20:05:48 GMT 2009
This bug was fixed in the package php5 - 5.2.6.dfsg.1-3ubuntu4.4
---------------
php5 (5.2.6.dfsg.1-3ubuntu4.4) jaunty-security; urgency=low
* SECURITY UPDATE: certificate spoofing via null-byte certs (LP: #446313)
- debian/patches/CVE-2009-3291.patch: validate certificate's CN length
in ext/openssl/openssl.c.
- CVE-2009-3291
* SECURITY UPDATE: denial of service via malformed exif images
(LP: #446313)
- debian/patches/CVE-2009-3292.patch: check length, return codes, and
nesting level in ext/exif/exif.c.
- CVE-2009-3292
* SECURITY UPDATE: safe_mode bypass via tempam function
- debian/patches/CVE-2009-3557.patch: check for safe_mode in
ext/standard/file.c.
- CVE-2009-3557
* SECURITY UPDATE: open_basedir restrictions bypass via posix_mkfifo
- debian/patches/CVE-2009-3558.patch: check for open_basedir in
ext/posix/posix.c.
- CVE-2009-3558
* SECURITY UPDATE: denial of service via large number of files in
form-data POST request.
- debian/patches/CVE-2009-4017.patch: introduce new "max_file_uploads"
directive and enforce in main/main.c, main/rfc1867.c.
- ATTENTION: this update changes previous php5 behaviour by limiting
the number of files in a POST request to 50. This may be increased
by adding a "max_file_uploads" directive to the php.ini configuration
file.
- CVE-2009-4017
* SECURITY UPDATE: safe_mode_protected_env_vars bypass via proc_open()
- debian/patches/CVE-2009-4018.patch: add safe_mode check in
ext/standard/proc_open.c
- CVE-2009-4018
* debian/patches/fix-xmlrpc-datetime.diff
- Prevent stack smashing when using xmlrpc and datetime. (LP: #239513)
-- Marc Deslauriers <marc.deslauriers at ubuntu.com> Thu, 26 Nov 2009 08:05:57 -0500
** Changed in: php5 (Ubuntu Jaunty)
Status: Triaged => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3291
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3292
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3557
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3558
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4017
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4018
** Changed in: php5 (Ubuntu Intrepid)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-7068
--
[SRU] stack smashing detected when calling xmlrpc_set_type
https://bugs.launchpad.net/bugs/239513
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in ubuntu.
More information about the Ubuntu-server-bugs
mailing list