aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2010-12-13 23:44:31 +0000
committerXin LI <delphij@FreeBSD.org>2010-12-13 23:44:31 +0000
commitcc866cefeb69583d4b7c8b2da3f8eeb441b83ceb (patch)
treebea264f296623206795b8b1ef8c09fdbc952971e /security/vuxml/vuln.xml
parent0250a1de3764b2ef21ccb6d55ff7ce3abd491560 (diff)
downloadports-cc866cefeb69583d4b7c8b2da3f8eeb441b83ceb.tar.gz
ports-cc866cefeb69583d4b7c8b2da3f8eeb441b83ceb.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml64
1 files changed, 64 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4e63b57ff265..74c5b6776c02 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,70 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b2a6fc0e-070f-11e0-a6e9-00215c6a37bb">
+ <topic>php -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>php5</name>
+ <range><lt>5.3.4</lt></range>
+ </package>
+ <package>
+ <name>php5</name>
+ <range><lt>5.2.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PHP developers reports:</p>
+ <blockquote cite="http://www.php.net/releases/5_3_4.php">
+ <p>Security Enhancements and Fixes in PHP 5.3.4:</p>
+ <ul>
+ <li>Fixed crash in zip extract method (possible
+ CWE-170).</li>
+ <li>Paths with NULL in them (foo\0bar.txt) are now
+ considered as invalid (CVE-2006-7243).</li>
+ <li>Fixed a possible double free in imap extension
+ (Identified by Mateusz Kocielski). (CVE-2010-4150).</li>
+ <li>Fixed NULL pointer dereference in
+ ZipArchive::getArchiveComment. (CVE-2010-3709).</li>
+ <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li>
+ <li>Fixed MOPS-2010-24, fix string validation.
+ (CVE-2010-2950).</li>
+ <li>Fixed symbolic resolution support when the target
+ is a DFS share.</li>
+ <li>Fixed bug #52929 (Segfault in filter_var with
+ FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710).</li>
+ </ul>
+ </blockquote>
+ <blockquote cite="http://www.php.net/releases/5_2_15.php">
+ <p>Security Enhancements and Fixes in PHP 5.2.15:</p>
+ <ul>
+ <li>Fixed extract() to do not overwrite $GLOBALS and $this
+ when using EXTR_OVERWRITE.</li>
+ <li>Fixed crash in zip extract method (possible CWE-170).</li>
+ <li>Fixed a possible double free in imap extension.</li>
+ <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li>
+ <li>Fixed NULL pointer dereference in ZipArchive::getArchiveComment.
+ (CVE-2010-3709).</li>
+ <li>Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL
+ with large amount of data).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-7243</cvename>
+ <cvename>CVE-2010-2950</cvename>
+ <cvename>CVE-2010-3436</cvename>
+ <cvename>CVE-2010-3709</cvename>
+ <cvename>CVE-2010-4150</cvename>
+ </references>
+ <dates>
+ <discovery>2010-12-10</discovery>
+ <entry>2010-12-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1d8ff4a2-0445-11e0-8e32-000f20797ede">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>