Change logs for php4 source package in Breezy

  • php4 (4:4.4.0-3ubuntu2) breezy-security; urgency=low
    
      * SECURITY UPDATE: multiple fixes backported from 5.1.2 and CVS:
        - Fix multiple HTTP response splitting vulnerabilities in sessions and
          the header() function, due to lack of input validation; CVE-2006-0207
          + Add safety checks in the header() function to make sure that we
            don't get newlines injected by (mis)use of user input in headers.
          + Add a check for invalid characters in session names, so that we
            aren't subject to HTTP response splitting vulnerabilities in
            the Set-Cookie header we send back out as a result of user input.
        - Filter HTML error reporting, preventing cross-site scripting attacks
          when both display_errors and html_errors are enabled; CVE-2006-0208
    
     -- Adam Conrad <email address hidden>   Wed,  8 Mar 2006 17:50:13 +1100
  • php4 (4:4.4.0-3ubuntu1) breezy-security; urgency=low
    
    
      * SECURITY UPDATE: multiple fixes backported from new upstream releases:
        - Resolves a local denial of service in the apache2 SAPI, which can
          be triggered by using session.save_path in .htaccess; CVE-2005-3319
        - Resolves an infinite loop in the exif_read_data function which can
          be triggered with a specially-crafted JPEG image; CVE-2005-3353
        - Resolves an XSS vulnerability in the phpinfo function; CVE-2005-3388
        - Resolves a vulnerability in the parse_str function whereby a remote
          attacker can fool PHP into turning on register_globals, thus making
          applications vulnerable to global variable injections; CVE-2005-3389
        - Resolves a vulnerability in the RFC1867 file upload feature where, if
          register_globals is enabled, a remote attacker can modify the GLOBALS
          array with a multipart/form-data POST request; see CVE-2005-3390
        - Resolves numerous safe_mode and open_basedir bypasses; CVE-2005-3391
        - Resolves INI settings leaks in the apache2 SAPI, leading to safe_mode
          and open_basedir bypasses between virtual hosts; CVE-2005-3392
        - Resolves a CRLF injection vulnerability in the mb_send_mail function,
          allowing injection of arbitrary mail headers; see CVE-2005-3883
    
     -- Adam Conrad <email address hidden>  Mon, 19 Dec 2005 16:48:53 +1100
  • php4 (4:4.4.0-3) unstable; urgency=low
    
    
      * Remove Andres Salomon from the Uploaders field, at his request.  Thanks
        for all your work on the PHP packages, Andres, now fix our kernel bugs.
      * Add 054-open_basedir_slash.patch, which fixes a bug where if open_basedir
        is set to "/foo/", users can access files in "/foobar/", which is not the
        documented behaviour; this addresses CAN-2005-3054 (closes: #323585)
      * Add 055-gd_safe_mode_checks.patch from PHP CVS, adding missing safe_mode
        checks to the _php_image_output and _php_image_output_ctx GD functions.
    
     -- Adam Conrad <adconrad@0c3.net>  Tue, 27 Sep 2005 16:12:05 +1000