[Bug 1028064] Re: potential overflow in _php_stream_scandir
Launchpad Bug Tracker
1028064 at bugs.launchpad.net
Mon Sep 17 12:13:12 UTC 2012
This bug was fixed in the package php5 - 5.3.10-1ubuntu3.4
---------------
php5 (5.3.10-1ubuntu3.4) precise-security; urgency=low
* SECURITY UPDATE: HTTP response-splitting issue with %0D sequences
- debian/patches/CVE-2011-1398.patch: properly handle %0D and NUL in
main/SAPI.c, added tests to ext/standard/tests/*, fix test suite
failures in ext/phar/phar_object.c.
- CVE-2011-1398
- CVE-2012-4388
* SECURITY UPDATE: denial of service and possible code execution via
_php_stream_scandir function (LP: #1028064)
- debian/patches/CVE-2012-2688.patch: prevent overflow in
main/streams/streams.c.
- CVE-2012-2688
* SECURITY UPDATE: denial of service via PDO extension crafted parameter
- debian/patches/CVE-2012-3450.patch: improve logic in
ext/pdo/pdo_sql_parser.re, regenerate ext/pdo/pdo_sql_parser.c, add
test to ext/pdo_mysql/tests/bug_61755.phpt.
- CVE-2012-3450
-- Marc Deslauriers <marc.deslauriers at ubuntu.com> Tue, 11 Sep 2012 11:28:52 -0400
** Changed in: php5 (Ubuntu Precise)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1398
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3450
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4388
** Changed in: php5 (Ubuntu Hardy)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1028064
Title:
potential overflow in _php_stream_scandir
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1028064/+subscriptions
More information about the Ubuntu-server-bugs
mailing list