~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2011-1466

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2011-03-19
2
 
Candidate: CVE-2011-1466
3
 
PublicDate: 2011-03-19
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466
6
 
 https://usn.ubuntu.com/usn/usn-1126-1
7
 
Description:
8
 
 Integer overflow in the SdnToJulian function in the Calendar extension in
9
 
 PHP before 5.3.6 allows context-dependent attackers to cause a denial of
10
 
 service (application crash) via a large integer in the first argument to
11
 
 the cal_from_jd function.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
 http://bugs.php.net/bug.php?id=53574
16
 
Priority: medium
17
 
Discovered-by:
18
 
Assigned-to: sbeattie
19
 
 
20
 
Patches_php5:
21
 
 upstream: http://svn.php.net/viewvc?view=revision&revision=306475
22
 
upstream_php5: released (5.3.6)
23
 
dapper_php5: released (5.1.2-1ubuntu3.22)
24
 
hardy_php5: released (5.2.4-2ubuntu5.15)
25
 
karmic_php5: released (5.2.10.dfsg.1-2ubuntu6.9)
26
 
lucid_php5: released (5.3.2-1ubuntu4.8)
27
 
maverick_php5: released (5.3.3-1ubuntu9.4)
28
 
natty_php5: not-affected (5.3.3-7ubuntu1)
29
 
devel_php5: not-affected (5.3.3-7ubuntu1)