[Bug 813115] Re: CVE-2011-2202

Launchpad Bug Tracker 813115 at bugs.launchpad.net
Mon Oct 17 22:59:07 UTC 2011


This bug was fixed in the package php5 - 5.2.4-2ubuntu5.18

---------------
php5 (5.2.4-2ubuntu5.18) hardy-security; urgency=low

  [ Angel Abad ]
  * SECURITY UPDATE: File path injection vulnerability in RFC1867 File
    upload filename (LP: #813115)
    - debian/patches/php5-CVE-2011-2202.patch:
    - CVE-2011-2202

  [ Steve Beattie ]
  * SECURITY UPDATE: DoS due to failure to check for memory allocation errors
    - debian/patches/php5-CVE-2011-3182.patch: check the return values
      of the malloc, calloc, and realloc functions
    - CVE-2011-3182
  * SECURITY UPDATE: Information leak via strchr interrupt (LP: #852865)
    - debian/patches/php5-CVE-2010-2484.patch: grab references before
      converting to string
    - CVE-2010-2484
 -- Steve Beattie <sbeattie at ubuntu.com>   Fri, 14 Oct 2011 20:10:17 -0700

** Changed in: php5 (Ubuntu Hardy)
       Status: Confirmed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2484

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/813115

Title:
  CVE-2011-2202

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/813115/+subscriptions



More information about the Ubuntu-server-bugs mailing list