[Bug 1028064] Re: potential overflow in _php_stream_scandir

Launchpad Bug Tracker 1028064 at bugs.launchpad.net
Mon Sep 17 12:16:59 UTC 2012


This bug was fixed in the package php5 - 5.3.5-1ubuntu7.11

---------------
php5 (5.3.5-1ubuntu7.11) natty-security; urgency=low

  * SECURITY UPDATE: HTTP response-splitting issue with %0D sequences
    - debian/patches/CVE-2011-1398.patch: properly handle %0D and NUL in
      main/SAPI.c, added tests to ext/standard/tests/*, fix test suite
      failures in ext/phar/phar_object.c.
    - CVE-2011-1398
    - CVE-2012-4388
  * SECURITY UPDATE: denial of service and possible code execution via
    _php_stream_scandir function (LP: #1028064)
    - debian/patches/CVE-2012-2688.patch: prevent overflow in
      main/streams/streams.c.
    - CVE-2012-2688
  * SECURITY UPDATE: denial of service via PDO extension crafted parameter
    - debian/patches/CVE-2012-3450.patch: improve logic in
      ext/pdo/pdo_sql_parser.re, regenerate ext/pdo/pdo_sql_parser.c, add
      test to ext/pdo_mysql/tests/bug_61755.phpt.
    - CVE-2012-3450
 -- Marc Deslauriers <marc.deslauriers at ubuntu.com>   Wed, 12 Sep 2012 09:11:28 -0400

** Changed in: php5 (Ubuntu Oneiric)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1028064

Title:
  potential overflow in _php_stream_scandir

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1028064/+subscriptions



More information about the Ubuntu-server-bugs mailing list