-
Committer:
Package Import Robot
-
Author(s):
Steve Beattie
-
Date:
2011-04-26 08:34:26 UTC
-
Revision ID:
package-import@ubuntu.com-20110426083426-t3652ebb9mcv5pw9
Tags: 5.3.5-1ubuntu7.1
* SECURITY UPDATE: arbitrary files removal via cronjob
- debian/php5-common.php5.cron.d: take greater care when removing
session files.
- http://git.debian.org/?p=pkg-php%2Fphp.git;a=commitdiff_plain;h=d09fd04ed7bfcf7f008360c6a42025108925df09
- CVE-2011-0441
* SECURITY UPDATE: symlink tmp races in pear install
- debian/patches/php5-pear-CVE-2011-1072.patch: improved
tempfile handling.
- debian/rules: apply patch manually after unpacking PEAR phar
archive.
- CVE-2011-1072
* SECURITY UPDATE: more symlink races in pear install
- debian/patches/php5-pear-CVE-2011-1144.patch: add TOCTOU save
file handler.
- debian/rules: apply patch manually after unpacking PEAR phar
archive.
- CVE-2011-1144
* SECURITY UPDATE: denial of service through application crash with
invalid images
- debian/patches/php5-CVE-2010-4698.patch: verify anti-aliasing
steps are either 4 or 16.
- CVE-2010-4698
* SECURITY UPDATE: denial of service through application crash
- debian/patches/php5-CVE-2011-0420.patch: improve grapheme_extract()
argument validation.
- CVE-2011-0420
* SECURITY UPDATE: denial of service through application crash
- debian/patches/php5-CVE-2011-0421.patch: fail operation gracefully
when handling zero sized zipfile with the FL_UNCHANGED argument
- CVE-2011-0421
* SECURITY UPDATE: denial of service through application crash when
handling images with invalid exif tags
- debian/patches/php5-CVE-2011-0708.patch: stricter exif checking
- CVE-2011-0708
* SECURITY UPDATE: denial of service and possible data disclosure
through integer overflow
- debian/patches/php5-CVE-2011-1092.patch: better boundary
condition checks in shmop_read()
- CVE-2011-1092
* SECURITY UPDATE: use-after-free vulnerability
- debian/patches/php5-CVE-2011-1148.patch: improve reference
counting
- CVE-2011-1148
* SECURITY UPDATE: format string vulnerability
- debian/patches/php5-CVE-2011-1153.patch: correctly quote format
strings
- CVE-2011-1153
* SECURITY UPDATE: denial of service through buffer overflow crash
(code execution mitigated by compilation with Fortify Source)
- debian/patches/php5-CVE-2011-1464.patch: limit amount of precision
to ensure fitting within MAX_BUF_SIZE
- CVE-2011-1464
* SECURITY UPDATE: denial of service through application crash
- debian/patches/php5-CVE-2011-1467.patch: check for invalid
attribute symbols in NumberFormatter::setSymbol()
- CVE-2011-1467
* SECURITY UPDATE: denial of service through memory leak
- debian/patches/php5-CVE-2011-1468.patch: fix memory leak of
openssl contexts
- CVE-2011-1468
* SECURITY UPDATE: denial of service through application crash
when using HTTP proxy with the FTP wrapper
- debian/patches/php5-CVE-2011-1469.patch: improve pointer handling
- CVE-2011-1469
* SECURITY UPDATE: denial of service through application crash when
handling ziparchive streams
- debian/patches/php5-CVE-2011-1470.patch: set necessary elements of
the meta data structure
- CVE-2011-1470
* SECURITY UPDATE: denial of service through application crash when
handling malformed zip files
- debian/patches/php5-CVE-2011-1471.patch: correct integer
signedness error when handling zip_fread() return value.
- CVE-2011-1471
* debian/control: replace build-depends on mysql-server with
mysql-server-core-5.1 and mysql-client-5.1 to avoid upstart and
mysql-server-5.1 postinst confusion with starting up multiple
mysqlds listening on the same port.