lp:ubuntu/hardy-updates/php5
- Get this branch:
- bzr branch lp:ubuntu/hardy-updates/php5
Branch merges
Branch information
Recent revisions
- 48. By Marc Deslauriers
-
* SECURITY UPDATE: arbitrary file disclosure via XML External Entity
- debian/patches/ CVE-2013- 1643.patch: disable the entity loader in
ext/libxml/ libxml. c, ext/libxml/ php_libxml. h, ext/soap/php_xml.c.
- CVE-2013-1643 - 47. By Marc Deslauriers
-
* SECURITY UPDATE: HTTP response-splitting issue with %0D sequences
- debian/patches/ CVE-2011- 1398.patch: properly handle %0D and NUL in
main/SAPI.c.
- CVE-2011-1398
- CVE-2012-4388
* SECURITY UPDATE: denial of service and possible code execution via
_php_stream_ scandir function (LP: #1028064)
- debian/patches/ CVE-2012- 2688.patch: prevent overflow in
main/streams/ streams. c.
- CVE-2012-2688
* SECURITY UPDATE: denial of service via PDO extension crafted parameter
- debian/patches/ CVE-2012- 3450.patch: improve logic in
ext/pdo/pdo_ sql_parser. re, regenerate ext/pdo/ pdo_sql_ parser. c, add
test to ext/pdo_mysql/tests/ bug_61755. phpt.
- CVE-2012-3450 - 46. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service via invalid tidy objects
- debian/patches/ CVE-2012- 0781.patch: track initialization in
ext/tidy/tidy. c, added tests to ext/tidy/ tests/004. phpt,
ext/tidy/tests/bug54682.phpt.
- CVE-2012-0781
* SECURITY UPDATE: denial of service or possible directory traversal via
invalid filename.
- debian/patches/ CVE-2012- 1172.patch: ensure brackets get closed in
main/rfc1867.c, add test to tests/basic/bug55500.phpt.
- CVE-2012-1172
* SECURITY UPDATE: improve php5-cgi query string parameter parsing
- debian/patches/ CVE-2012- 233x.patch: improve parsing in
sapi/cgi/cgi_ main.c.
- CVE-2012-2335
- CVE-2012-2336 - 45. By Steve Beattie
-
* SECURITY UPDATE: php5-cgi query string parameters parsing
vulnerability
- debian/patches/ php5-CVE- 2012-1823. patch: filter query strings that
are prefixed with '-'
- CVE-2012-1823
- CVE-2012-2311 - 44. By Steve Beattie
-
debian/
patches/ php5-CVE- 2012-0831- regression. patch: fix
magic_quotes_gpc ini setting regression introduced by patch for
CVE-2012-0831. Thanks to Ondřej Surý for the patch. (LP: #930115) - 43. By Steve Beattie
-
* SECURITY UPDATE: memory allocation failure denial of service
- debian/patches/ php5-CVE- 2011-4153. patch: check result of
zend_strdup() and calloc() for failed allocations
- CVE-2011-4153
* SECURITY UPDATE: predictable hash collision denial of service
- debian/patches/ php5-CVE- 2011-4885. patch: add max_input_vars
directive with default limit of 1000
- ATTENTION: this update changes previous php5 behavior by
limiting the number of external input variables to 1000.
This may be increased by adding a "max_input_vars"
directive to the php.ini configuration file. See
http://www.php. net/manual/ en/info. configuration. php#ini. max-input- vars
for more information.
- CVE-2011-4885
* SECURITY UPDATE: remote code execution vulnerability introduced by
the fix for CVE-2011-4885
- debian/patches/ php5-CVE- 2012-0830. patch: return rather than
continuing if max_input_vars limit is reached
- CVE-2012-0830
* SECURITY UPDATE: XSLT arbitrary file overwrite attack
- debian/patches/ php5-CVE- 2012-0057. patch: add xsl.security_prefs
ini option to define forbidden operations within XSLT stylesheets
- CVE-2012-0057
* SECURITY UPDATE: PDORow session denial of service
- debian/patches/ php5-CVE- 2012-0788. patch: fail gracefully when
attempting to serialize PDORow instances
- CVE-2012-0788
* SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
- debian/patches/ php5-CVE- 2012-0831. patch: always restore
magic_quote_gpc on request shutdown
- CVE-2012-0831 - 42. By Marc Deslauriers
-
* SECURITY UPDATE: Denial of service and possible information disclosure
via exif integer overflow
- debian/patches/ php5-CVE- 2011-4566. patch: fix count checks in
ext/exif/exif. c.
- CVE-2011-4566 - 41. By Steve Beattie
-
[ Angel Abad ]
* SECURITY UPDATE: File path injection vulnerability in RFC1867 File
upload filename (LP: #813115)
- debian/patches/ php5-CVE- 2011-2202. patch:
- CVE-2011-2202[ Steve Beattie ]
* SECURITY UPDATE: DoS due to failure to check for memory allocation errors
- debian/patches/ php5-CVE- 2011-3182. patch: check the return values
of the malloc, calloc, and realloc functions
- CVE-2011-3182
* SECURITY UPDATE: Information leak via strchr interrupt (LP: #852865)
- debian/patches/ php5-CVE- 2010-2484. patch: grab references before
converting to string
- CVE-2010-2484 - 40. By Steve Beattie
-
* debian/
patches/ php5-pear- CVE-2011- 1144-regression .patch: fix
mkdir parenthesis issue and PEAR::raiseErro typo (LP: #774452)
* debian/patches/ php5-CVE- 2010-4697- regression. patch: fix regression
in reference counting added by fix for CVE-2010-4697 (LP: #776642) - 39. By Steve Beattie
-
* SECURITY UPDATE: arbitrary files removal via cronjob
- debian/php5-common. php5.cron. d: take greater care when removing
session files.
- http://git.debian. org/?p= pkg-php% 2Fphp.git; a=commitdiff_ plain;h= d09fd04ed7bfcf7 f008360c6a42025 108925df09
- CVE-2011-0441
* SECURITY UPDATE: symlink tmp races in pear install
- debian/patches/ php5-pear- CVE-2011- 1072.patch: improved
tempfile handling.
- debian/rules: apply patch manually after unpacking PEAR phar
archive.
- CVE-2011-1072
* SECURITY UPDATE: more symlink races in pear install
- debian/patches/ php5-pear- CVE-2011- 1144.patch: add TOCTOU save
file handler.
- debian/rules: apply patch manually after unpacking PEAR phar
archive.
- CVE-2011-1144
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/ php5-CVE- 2010-4697. patch: retain reference to
object until getter/setter are done.
- CVE-2010-4697
* SECURITY UPDATE: denial of service through application crash with
invalid images
- debian/patches/ php5-CVE- 2010-4698. patch: verify anti-aliasing
steps are either 4 or 16.
- CVE-2010-4698
* SECURITY UPDATE: denial of service through application crash
- debian/patches/ php5-CVE- 2011-0421. patch: fail operation gracefully
when handling zero sized zipfile with the FL_UNCHANGED argument
- CVE-2011-0421
* SECURITY UPDATE: denial of service through application crash when
handling images with invalid exif tags
- debian/patches/ php5-CVE- 2011-0708. patch: stricter exif checking
- CVE-2011-0708
* SECURITY UPDATE: denial of service and possible data disclosure
through integer overflow
- debian/patches/ php5-CVE- 2011-1092. patch: better boundary
condition checks in shmop_read()
- CVE-2011-1092
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/ php5-CVE- 2011-1148. patch: improve reference
counting
- CVE-2011-1148
* SECURITY UPDATE: denial of service through buffer overflow crash
(code execution mitigated by compilation with Fortify Source)
- debian/patches/ php5-CVE- 2011-1464. patch: limit amount of precision
to ensure fitting within MAX_BUF_SIZE
- CVE-2011-1464
* SECURITY UPDATE: denial of service through application crash via
integer overflow.
- debian/patches/ php5-CVE- 2011-1466. patch: improve boundary
condition checking in SdnToJulian()
- CVE-2011-1466
* SECURITY UPDATE: denial of service through application crash
when using HTTP proxy with the FTP wrapper
- debian/patches/ php5-CVE- 2011-1469. patch: improve pointer handling
- CVE-2011-1469
* SECURITY UPDATE: denial of service through application crash when
handling ziparchive streams
- debian/patches/ php5-CVE- 2011-1470. patch: set necessary elements of
the meta data structure
- CVE-2011-1470
* SECURITY UPDATE: denial of service through application crash when
handling malformed zip files
- debian/patches/ php5-CVE- 2011-1471. patch: correct integer
signedness error when handling zip_fread() return value.
- CVE-2011-1471
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp:ubuntu/karmic/php5