~ubuntu-branches/ubuntu/maverick/php5/maverick-security

Viewing all changes in revision 75.

  • Committer: Package Import Robot
  • Author(s): Steve Beattie
  • Date: 2011-01-05 22:45:19 UTC
  • mfrom: (74.1.1 maverick-proposed)
  • Revision ID: package-import@ubuntu.com-20110105224519-7qok430z3fef7xq9
Tags: 5.3.3-1ubuntu9.2
* SECURITY UPDATE: open_basedir bypass
  - debian/patches/php5-CVE-2010-3436.patch: more strict checking in
    php_check_specific_open_basedir()
  - CVE-2010-3436
* SECURITY UPDATE: NULL pointer dereference crash
  - debian/patches/php5-CVE-2010-3709.patch: check for NULL when
    getting zip comment
  - CVE-2010-3709
* SECURITY UPDATE: memory consumption denial of service
  - debian/patches/php5-CVE-2010-3710.patch: check for email address
    longer than RFC 2821 allows
  - CVE-2010-3710
* SECURITY UPDATE: xml decode bypass
  - debian/patches/php5-CVE-2010-3870.patch: improve utf8 decoding
  - CVE-2010-3870
* SECURITY UPDATE: memory disclosure
  - debian/patches/php5-CVE-2010-4156.patch: check for excessive
    length in mb_strcut()
  - CVE-2010-4156
* SECURITY UPDATE: integer overflow can cause an application crash
  - debian/patches/php5-CVE-2010-4409.patch: fix invalid args in
    NumberFormatter::getSymbol()
  - CVE-2010-4409
* SECURITY UPDATE: infinite loop/denial of service when dealing with
  certain textual forms of MAX_FLOAT (LP: #697181)
  - debian/patches/php5-CVE-2010-4645.patch: treat local doubles
    as volatile to avoid x87 registers in zend_strtod()
  - CVE-2010-4645

expand all expand all

Show diffs side-by-side

added added

removed removed

Lines of Context: