[Secure-testing-commits] r34427 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri May 22 10:47:34 UTC 2015


Author: carnil
Date: 2015-05-22 10:47:34 +0000 (Fri, 22 May 2015)
New Revision: 34427

Modified:
   data/CVE/list
Log:
Some of php5 issues fixed in unstable, possibly more, but needs check

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-05-22 10:42:54 UTC (rev 34426)
+++ data/CVE/list	2015-05-22 10:47:34 UTC (rev 34427)
@@ -154,29 +154,29 @@
 	RESERVED
 CVE-2015-4026 [pcntl_exec() should not allow null char]
 	RESERVED
-	- php5 <unfixed>
+	- php5 5.6.9+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=68598
 	TODO: check
 CVE-2015-4025 [CVE-2006-7243 fix regressions in 5.4+]
 	RESERVED
-	- php5 <unfixed>
+	- php5 5.6.9+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=69418
 	TODO: check
 CVE-2015-4024 [DoS possibility due to ineffective parsing of form data]
 	RESERVED
-	- php5 <unfixed>
+	- php5 5.6.9+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=69364
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2
 	TODO: check
 CVE-2015-4022 [integer overflow on reading FTP server data leading to heap overflow]
 	RESERVED
-	- php5 <unfixed>
+	- php5 5.6.9+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=69545
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2
 	TODO: check
 CVE-2015-4021 [Memory Corruption in phar_parse_tarfile when entry filename starts with null]
 	RESERVED
-	- php5 <unfixed>
+	- php5 5.6.9+dfsg-1
 	NOTE: https://bugs.php.net/bug.php?id=69453
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=c27f012b7a447e59d4a704688971cbfa7dddaa74
 	NOTE: http://www.openwall.com/lists/oss-security/2015/05/17/2 and http://www.openwall.com/lists/oss-security/2015/05/18/2




More information about the Secure-testing-commits mailing list