1
php5 (5.3.6-13ubuntu3.5) oneiric-security; urgency=low
3
* SECURITY UPDATE: memory allocation failure denial of service
4
- debian/patches/php5-CVE-2011-4153.patch: check result of
5
zend_strdup() and calloc() for failed allocations
7
* SECURITY UPDATE: predictable hash collision denial of service
9
- debian/patches/php5-CVE-2011-4885.patch: add max_input_vars
10
directive with default limit of 1000
11
- ATTENTION: this update changes previous php5 behavior by
12
limiting the number of external input variables to 1000.
13
This may be increased by adding a "max_input_vars"
14
directive to the php.ini configuration file. See
15
http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars
18
* SECURITY UPDATE: remote code execution vulnerability introduced by
19
the fix for CVE-2011-4885 (LP: #925772)
20
- debian/patches/php5-CVE-2012-0830.patch: return rather than
21
continuing if max_input_vars limit is reached
23
* SECURITY UPDATE: XSLT arbitrary file overwrite attack
24
- debian/patches/php5-CVE-2012-0057.patch: add xsl.security_prefs
25
ini option to define forbidden operations within XSLT stylesheets
27
* SECURITY UPDATE: PDORow session denial of service
28
- debian/patches/php5-CVE-2012-0788.patch: fail gracefully when
29
attempting to serialize PDORow instances
31
* SECURITY UPDATE: magic_quotes_gpc remote disable vulnerability
32
- debian/patches/php5-CVE-2012-0831.patch: always restore
33
magic_quote_gpc on request shutdown
36
-- Steve Beattie <sbeattie@ubuntu.com> Wed, 08 Feb 2012 20:56:28 -0800
1
38
php5 (5.3.6-13ubuntu3.3) oneiric-security; urgency=low
3
40
* SECURITY UPDATE: Denial of service and possible information disclosure