Change logs for php5 source package in Wily

  • php5 (5.6.11+dfsg-1ubuntu3.4) wily-security; urgency=medium
    
      * SECURITY UPDATE: heap corruption in tar/zip/phar parser
        - debian/patches/CVE-2016-4342.patch: remove UMR when size is 0 in
          ext/phar/phar_object.c.
        - CVE-2016-4342
      * SECURITY UPDATE: uninitialized pointer in phar_make_dirstream()
        - debian/patches/CVE-2016-4343.patch: check lengths in
          ext/phar/dirstream.c, ext/phar/tar.c.
        - CVE-2016-4343
      * SECURITY UPDATE: bcpowmod accepts negative scale and corrupts _one_
        definition
        - debian/patches/CVE-2016-4537.patch: properly detect scale in
          ext/bcmath/bcmath.c, add test to ext/bcmath/tests/bug72093.phpt.
        - CVE-2016-4537
        - CVE-2016-4538
      * SECURITY UPDATE: xml_parse_into_struct segmentation fault
        - debian/patches/CVE-2016-4539.patch: check parser->level in
          ext/xml/xml.c, added test to ext/xml/tests/bug72099.phpt.
        - CVE-2016-4539
      * SECURITY UPDATE: out-of-bounds reads in zif_grapheme_stripos and
        zif_grapheme_strpos with negative offset
        - debian/patches/CVE-2016-4540.patch: check bounds in
          ext/intl/grapheme/grapheme_string.c, added test to
          ext/intl/tests/bug72061.phpt.
        - CVE-2016-4540
        - CVE-2016-4541
      * SECURITY UPDATE: out of bounds heap read access in exif header
        processing
        - debian/patches/CVE-2016-4542.patch: check sizes and length in
          ext/exif/exif.c.
        - CVE-2016-4542
        - CVE-2016-4543
        - CVE-2016-4544
    
     -- Marc Deslauriers <email address hidden>  Thu, 19 May 2016 12:03:33 -0400
  • php5 (5.6.11+dfsg-1ubuntu3.3) wily-security; urgency=medium
    
      * SECURITY REGRESSION: out of memory in SOAP (LP: #1575298)
        - debian/patches/CVE-2015-8835.patch: updated to fix bad patch
          backport.
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Apr 2016 14:57:54 -0400
  • php5 (5.6.11+dfsg-1ubuntu3.2) wily-security; urgency=medium
    
      * SECURITY UPDATE: directory traversal in ZipArchive::extractTo
        - debian/patches/CVE-2014-9767.patch: use proper path in
          ext/zip/php_zip.c, added test to ext/zip/tests/bug70350.phpt.
        - CVE-2014-9767
      * SECURITY UPDATE: type confusion issue in SoapClient
        - debian/patches/CVE-2015-8835.patch: check types in
          ext/soap/php_http.c.
        - CVE-2015-8835
        - CVE-2016-3185
      * SECURITY UPDATE: denial of service or memory disclosure in gd via large
        bgd_color argument to imagerotate
        - debian/patches/CVE-2016-1903.patch: check bgcolor in
          ext/gd/libgd/gd_interpolation.c, added test to
          ext/gd/tests/bug70976.phpt.
        - CVE-2016-1903
      * SECURITY UPDATE: stack overflow when decompressing tar archives
        - debian/patches/CVE-2016-2554.patch: handle non-terminated linknames
          in ext/phar/tar.c.
        - CVE-2016-2554
      * SECURITY UPDATE: use-after-free in WDDX
        - debian/patches/CVE-2016-3141.patch: fix stack in ext/wddx/wddx.c,
          added test to ext/wddx/tests/bug71587.phpt.
        - CVE-2016-3141
      * SECURITY UPDATE: out-of-Bound Read in phar_parse_zipfile()
        - debian/patches/CVE-2016-3142.patch: check bounds in ext/phar/zip.c.
        - CVE-2016-3142
      * SECURITY UPDATE: openssl_random_pseudo_bytes() is not cryptographically
        secure
        - debian/patches/bug70014.patch: use RAND_bytes instead of deprecated
          RAND_pseudo_bytes in ext/openssl/openssl.c.
        - No CVE number
      * SECURITY UPDATE: buffer over-write in finfo_open with malformed magic
        file
        - debian/patches/bug71527.patch: properly calculate length in
          ext/fileinfo/libmagic/funcs.c, added test to
          ext/fileinfo/tests/bug71527.magic.
        - CVE number pending
      * SECURITY UPDATE: php_snmp_error() format string Vulnerability
        - debian/patches/bug71704.patch: use format string in ext/snmp/snmp.c.
        - CVE number pending
      * SECURITY UPDATE: integer overflow in php_raw_url_encode
        - debian/patches/bug71798.patch: use size_t in ext/standard/url.c.
        - CVE number pending
      * SECURITY UPDATE: invalid memory write in phar on filename containing
        NULL
        - debian/patches/bug71860.patch: require valid paths in
          ext/phar/phar.c, ext/phar/phar_object.c, fix tests in
          ext/phar/tests/badparameters.phpt,
          ext/phar/tests/bug64931/bug64931.phpt,
          ext/phar/tests/create_path_error.phpt,
          ext/phar/tests/phar_extract.phpt,
          ext/phar/tests/phar_isvalidpharfilename.phpt,
          ext/phar/tests/phar_unlinkarchive.phpt,
          ext/phar/tests/pharfileinfo_construct.phpt.
        - CVE number pending
      * SECURITY UPDATE: invalid negative size in mbfl_strcut
        - debian/patches/bug71906.patch: fix length checks in
          ext/mbstring/libmbfl/mbfl/mbfilter.c.
        - CVE number pending
    
     -- Marc Deslauriers <email address hidden>  Fri, 15 Apr 2016 10:37:57 -0400
  • php5 (5.6.11+dfsg-1ubuntu3.1) wily-security; urgency=medium
    
      * SECURITY UPDATE: null pointer dereference in phar_get_fp_offset()
        - debian/patches/CVE-2015-7803.patch: check link in ext/phar/util.c.
        - CVE-2015-7803
      * SECURITY UPDATE: uninitialized pointer in phar_make_dirstream()
        - debian/patches/CVE-2015-7804.patch: check filename length in
          ext/phar/util.c, ext/phar/zip.c.
        - CVE-2015-7804
    
     -- Marc Deslauriers <email address hidden>  Tue, 27 Oct 2015 16:47:59 -0400
  • php5 (5.6.11+dfsg-1ubuntu3) wily; urgency=medium
    
      * SECURITY UPDATE: multiple use-after-free issues in unserialize()
        - debian/patches/CVE-2015-6831-1.patch: fix SPLArrayObject in
          ext/spl/spl_array.c, added test to ext/spl/tests/bug70166.phpt.
        - debian/patches/CVE-2015-6831-2.patch: fix SplObjectStorage in
          ext/spl/spl_observer.c, added test to ext/spl/tests/bug70168.phpt.
        - debian/patches/CVE-2015-6831-3.patch: fix SplDoublyLinkedList in
          ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70169.phpt.
        - CVE-2015-6831
      * SECURITY UPDATE: dangling pointer in the unserialization of ArrayObject
        items
        - debian/patches/CVE-2015-6832.patch: fix dangling pointer in
          ext/spl/spl_array.c, added test to ext/spl/tests/bug70068.phpt.
        - CVE-2015-6832
      * SECURITY UPDATE: phar files extracted outside of destination dir
        - debian/patches/CVE-2015-6833-1.patch: limit extracted files to given
          directory in ext/phar/phar_object.c.
        - debian/patches/CVE-2015-6833-2.patch: use emalloc in
          ext/phar/phar_object.c.
        - CVE-2015-6833
      * SECURITY UPDATE: multiple vulnerabilities in unserialize()
        - debian/patches/CVE-2015-6834-1.patch: fix use-after-free in
          ext/standard/var.c, ext/standard/var_unserializer.*.
        - debian/patches/CVE-2015-6834-2.patch: fix use-after-free in
          ext/spl/spl_observer.c, added test to ext/spl/tests/bug70365.phpt.
        - debian/patches/CVE-2015-6834-3.patch: fix use-after-free in
          ext/spl/spl_dllist.c, added test to ext/spl/tests/bug70366.phpt.
        - CVE-2015-6834
      * SECURITY UPDATE: use after free in session deserializer
        - debian/patches/CVE-2015-6835-1.patch: fix use after free in
          ext/session/session.c, ext/standard/var_unserializer.*
          fixed tests in ext/session/tests/session_decode_error2.phpt,
          ext/session/tests/session_decode_variation3.phpt.
        - debian/patches/CVE-2015-6835-2.patch: add more fixes to
          ext/session/session.c.
        - CVE-2015-6835
      * SECURITY UPDATE: SOAP serialize_function_call() type confusion
        - debian/patches/CVE-2015-6836.patch: check type in ext/soap/soap.c,
          added test to ext/soap/tests/bug70388.phpt.
        - CVE-2015-6836
      * SECURITY UPDATE: NULL pointer dereference in XSLTProcessor class
        - debian/patches/CVE-2015-6837-6838.patch: fix logic in
          ext/xsl/xsltprocessor.c.
        - CVE-2015-6837
        - CVE-2015-6838
    
     -- Marc Deslauriers <email address hidden>  Mon, 28 Sep 2015 07:26:44 -0400
  • php5 (5.6.11+dfsg-1ubuntu2) wily; urgency=medium
    
      * No-change rebuild against new libicu
    
     -- Iain Lane <email address hidden>  Wed, 05 Aug 2015 17:41:17 +0100
  • php5 (5.6.11+dfsg-1ubuntu1) wily; urgency=medium
    
      * Merge from Debian. Remaining changes:
        - Drop support for firebird, c-client, mcrypt, onig and qdbm as they
          are in universe:
          + d/control: drop Build-Depends on firebird-dev, libc-client-dev,
            libmcrypt-dev, libonig-dev, libqdbm-dev.
          + d/control: drop binary packages php5-imap, php5-interbase and
            php5-mcrypt and their reverse dependencies.
          + d/rules: drop configuration of qdgm, onig, imap, mcrypt.
          + d/rules: drop CONFIGURE_APACHE_ARGS settings since now we don't
            build interbase or firebird.
          + d/modulelist: drop imap, interbase and mcrypt.
        - d/control: switch Build-Depends of netcat-traditional to
          netcat-openbsd as only the latter is in main.
        - d/source_php5.py, d/rules: add apport hook.
      * New upstream version uses __builtin_clzl when  __powerpc__ is defined,
        improving performance on POWER systems (LP: #1458434).
      * Drop changes (patches included upstream): CVE-2015-4598.patch,
        CVE-2015-4643.patch, CVE-2015-4644.patch.
    
     -- Robie Basak <email address hidden>  Mon, 27 Jul 2015 11:15:34 +0000
  • php5 (5.6.9+dfsg-1ubuntu1) wily; urgency=medium
    
      * Merge from Debian. Remaining changes:
        - d/control: drop Build-Depends that are in universe: firebird-dev,
          libc-client-dev, libmcrypt-dev, libonig-dev, libqdbm-dev.
        - d/rules: drop configuration of packages that are in universe: qdgm, onig.
        - d/rules: drop CONFIGURE_APACHE_ARGS settings since now we don't build
          interbase or firebird.
        - d/control: drop binary packages php5-imap, php5-interbase and php5-mcrypt
          since we have separate versions in universe.
        - d/modulelist: drop imap, interbase and mcrypt since we have separate
          versions in universe.
        - d/rules: drop configuration of imap and mcrypt since we have separate
          versions in universe.
        - d/source_php5.py, d/rules: add apport hook.
        - d/control: switch Build-Depends of netcat-traditional to netcat-openbsd
          as only the latter is in main.
      * Dropped changes:
        - patches included in new upstream version: CVE-2014-9427.patch,
          CVE-2014-9652.patch, CVE-2015-0231.patch, CVE-2015-0232.patch,
          CVE-2015-1351.patch, CVE-2015-1352.patch, remove_readelf.patch,
          CVE-2014-9705.patch, CVE-2015-0273.patch, CVE-2015-2301.patch,
          CVE-2015-2305.patch, CVE-2015-2331.patch, CVE-2015-2348.patch,
          CVE-2015-2787.patch, CVE-2015-2783.patch, bug69218.patch,
          bug69441.patch.
      * SECURITY UPDATE: more missing file path null byte checks
        - debian/patches/CVE-2015-4598.patch: add missing checks to
          ext/dom/document.c, ext/gd/gd.c, fix test in
          ext/dom/tests/DOMDocument_loadHTMLfile_error2.phpt.
        - CVE-2015-4598
      * SECURITY UPDATE: arbitrary code execution via ftp server long reply to
        a LIST command
        - debian/patches/CVE-2015-4643.patch: prevent overflow check bypass in
          ext/ftp/ftp.c.
        - CVE-2015-4643
      * SECURITY UPDATE: denial of service via php_pgsql_meta_data
        - debian/patches/CVE-2015-4644.patch: check return value in
          ext/pgsql/pgsql.c, add test to ext/pgsql/pg_insert_002.phpt.
        - CVE-2015-4644
    
    php5 (5.6.9+dfsg-1) unstable; urgency=medium
    
      * New upstream version 5.6.9+dfsg
       - Core:
        . Fixed bug #69467 (Wrong checked for the interface by using Trait).
        . Fixed bug #69420 (Invalid read in zend_std_get_method).
        . Fixed bug #60022 ("use statement [...] has no effect" depends on
          leading backslash).
        . Fixed bug #67314 (Segmentation fault in gc_remove_zval_from_buffer).
        . Fixed bug #68652 (segmentation fault in destructor).
        . Fixed bug #69419 (Returning compatible sub generator produces a
          warning).
        . Fixed bug #69472 (php_sys_readlink ignores misc errors from
          GetFinalPathNameByHandleA).
        . Fixed bug #69364 (PHP Multipart/form-data remote dos Vulnerability).
        . Fixed bug #69403 (str_repeat() sign mismatch based memory corruption).
        . Fixed bug #69418 (CVE-2006-7243 fix regressions in 5.4+).
        . Fixed bug #69522 (heap buffer overflow in unpack()).
       - FTP:
        . Fixed bug #69545 (Integer overflow in ftp_genlist() resulting in
          heap overflow).
       - ODBC:
        . Fixed bug #69354 (Incorrect use of SQLColAttributes with ODBC 3.0).
        . Fixed bug #69474 (ODBC: Query with same field name from two tables
          returns incorrect result).
        . Fixed bug #69381 (out of memory with sage odbc driver).
       - OpenSSL:
        . Fixed bug #69402 (Reading empty SSL stream hangs until timeout).
       - PCNTL:
        . Fixed bug #68598 (pcntl_exec() should not allow null char).
       - PCRE
        . Upgraded pcrelib to 8.37.
       - Phar:
        . Fixed bug #69453 (Memory Corruption in phar_parse_tarfile when entry
          filename starts with null).
      * Rebased patches on top of 5.6.9+dfsg version
    
    php5 (5.6.8+dfsg-1) unstable; urgency=medium
    
      * New upstream version 5.6.8+dfsg
       - Core:
         . Fixed bug #66609 (php crashes with __get() and ++ operator in some cases).
           (Dmitry, Laruence)
         . Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8
           characters). (Tjerk)
         . Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
         . Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM
           configuration options). (Anatol Belski)
         . Additional fix for bug #69152 (Type confusion vulnerability in
           exception::getTraceAsString). (Stas)
         . Fixed bug #69210 (serialize function return corrupted data when sleep has
           non-string values). (Juan Basso)
         . Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in
           __call/... arg passing). (Nikita)
         . Fixed bug #69221 (Segmentation fault when using a generator in combination
           with an Iterator). (Nikita)
         . Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion
           vulnerability). (Stas)
         . Fixed bug #69353 (Missing null byte checks for paths in various PHP
           extensions). (Stas)
       - Apache2handler:
         . Fixed bug #69218 (potential remote code execution with apache 2.4
           apache2handler). (Gerrit Venema)
       - cURL:
         . Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
         . Fixed bug #68739 (Missing break / control flow). (Laruence)
         . Fixed bug #69316 (Use-after-free in php_curl related to
           CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)
       - Date:
         . Fixed bug #69336 (Issues with "last day of <monthname>"). (Derick Rethans)
       - Enchant:
         . Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows
           builds). (Anatol)
       - Ereg:
         . Fixed bug #68740 (NULL Pointer Dereference). (Laruence)
       - Fileinfo:
         . Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or
           segfault). (Anatol Belski)
       - Filter:
         . Fixed bug #69202: (FILTER_FLAG_STRIP_BACKTICK ignored unless other
           flags are used). (Jeff Welch)
         . Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff
           Welch)
       - OPCache:
         . Fixed bug #69297 (function_exists strange behavior with OPCache on
           disabled function). (Laruence)
         . Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)
         . Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)
       - OpenSSL
         . Fixed bugs #68853, #65137 (Buffered crypto stream data breaks IO polling
           in stream_select() contexts) (Chris Wright)
         . Fixed bug #69197 (openssl_pkcs7_sign handles default value incorrectly)
           (Daniel Lowrey)
         . Fixed bug #69215 (Crypto servers should send client CA list)
           (Daniel Lowrey)
         . Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)
       - Phar:
         . Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar).
           (Mike)
         . Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
         . Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
         . Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing
           ".tar"). (Mike)
         . Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
         . Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
           phar_set_inode). (Stas)
       - Postgres:
         . Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)
       - SPL:
         . Fixed bug #69227 (Use after free in zval_scan caused by
            spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)
       - SOAP:
         . Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader
            (bisected, regression)). (Laruence)
       - Sqlite3:
         . Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception).
            (Dan Ackroyd)
         . Fixed bug #69287 (Upgrade bundled libsqlite to 3.8.8.3). (Anatol)
         . Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)
      * Update d/gbp.conf to new config style
      * Update patches for 5.6.8 release
      * Switch to gbp pq patch management
    
    php5 (5.6.7+dfsg-1) unstable; urgency=medium
    
      * New upstream version 5.6.7+dfsg
       - Core:
        . Fixed bug #69174 (leaks when unused inner class use traits
          precedence).
        . Fixed bug #69139 (Crash in gc_zval_possible_root on unserialize).
        . Fixed bug #69121 (Segfault in get_current_user when script owner is
          not in passwd with ZTS build).
        . Fixed bug #65593 (Segfault when calling ob_start from output
          buffering callback).
        . Fixed bug #68986 (pointer returned by
          php_stream_fopen_temporary_file not validated in memory.c).
        . Fixed bug #68166 (Exception with invalid character causes segv).
        . Fixed bug #69141 (Missing arguments in reflection info for some
          builtin functions).
        . Fixed bug #68976 (Use After Free Vulnerability in unserialize())
          (CVE-2015-0231).
        . Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM
          configuration options).
        . Fixed bug #69207 (move_uploaded_file allows nulls in path).
       - CGI:
        . Fixed bug #69015 (php-cgi's getopt does not see $argv).
       - CLI:
        . Fixed bug #67741 (auto_prepend_file messes up __LINE__).
       - cURL:
        . Fixed bug #69088 (PHP_MINIT_FUNCTION does not fully initialize cURL
          on Win32).
        . Add CURLPROXY_SOCKS4A and CURLPROXY_SOCKS5_HOSTNAME constants if
          supported by libcurl.
       - Ereg:
        . Fixed bug #69248 (heap overflow vulnerability in regcomp.c)
          (CVE-2015-2305).
       - FPM:
        . Fixed bug #68822 (request time is reset too early).
       - ODBC:
        . Fixed bug #68964 (Allowed memory size exhausted with odbc_exec).
       - Opcache:
        . Fixed bug #69159 (Opcache causes problem when passing a variable
          variable to a function).
        . Fixed bug #69125 (Array numeric string as key).
        . Fixed bug #69038 (switch(SOMECONSTANT) misbehaves).
       - OpenSSL:
        . Fixed bug #68912 (Segmentation fault at openssl_spki_new).
        . Fixed bug #61285, #68329, #68046, #41631 (encrypted streams don't
          observe socket timeouts).
        . Fixed bug #68920 (use strict peer_fingerprint input checks)
        . Fixed bug #68879 (IP Address fields in subjectAltNames not used)
        . Fixed bug #68265 (SAN match fails with trailing DNS dot)
        . Fixed bug #67403 (Add signatureType to openssl_x509_parse)
        . Fixed bug (#69195 Inconsistent stream crypto values across versions)
       - pgsql:
        . Fixed bug #68638 (pg_update() fails to store infinite values).
       - Readline:
        . Fixed bug #69054 (Null dereference in
          readline_(read|write)_history() without parameters).
       - SOAP:
        . Fixed bug #69085 (SoapClient's __call() type confusion through
          unserialize()).
       - SPL:
        . Fixed bug #69108 ("Segmentation fault" when (de)serializing
          SplObjectStorage).
        . Fixed bug #68557 (RecursiveDirectoryIterator::seek(0) broken after
          calling getChildren()).
       - ZIP:
        . Fixed bug #69253 (ZIP Integer Overflow leads to writing past heap
          boundary) (CVE-2015-2331).
      * Refresh patches for 5.6.7 release
      * Pull a patch to fix SQL_DESC_OCTET_LENGTH not supported by ADS ODBC
        driver (PHP#68350) from Debian wheezy PHP 5.4 branch
      * Fix PHP segfault in zend_hash_find (PHP#68486)
      * Move PEAR-Builder-print-info-about-php5-dev.patch to debian/ as it's
        not a quilt patch
    
    php5 (5.6.6+dfsg-2) unstable; urgency=medium
    
      * Fix use after free in 'opcache' component of PHP (CVE-2015-1351)
      * Fix NULL Pointer Deference in pgsql (CVE-2015-1352) (Closes: #777033)
    
    php5 (5.6.6+dfsg-1) unstable; urgency=medium
    
      * New upstream version 5.6.6+dfsg
      * Pull patch from DragonFly BSD Project to limit the pattern space to
        avoid a 32-bit overflow in Henry Spencer regular expressions (regex)
        library (Closes: #778389)
      * Update patches for 5.6.6 release
    
    php5 (5.6.5+dfsg-2) unstable; urgency=high
    
      * Add patch to revert upstream commit on feof that broke Horde and
        others (Courtesy of Mike Gabriel) (Closes: #778374)
    
    php5 (5.6.5+dfsg-1) unstable; urgency=medium
    
      * New upstream version 5.6.5+dfsg
      * Security vulnerabilities fixed:
       + Core
        - Fixed bug #68710 (Use After Free Vulnerability in PHP's
          unserialize()). (CVE-2015-0231)
       + CGI:
        - Fixed bug #68618 (out of bounds read crashes
          php-cgi). (CVE-2014-9427)
       + EXIF:
        - Fixed bug #68799: Free called on unitialized
          pointer. (CVE-2015-0232)
      * Update patches for 5.6.5 release
    
     -- Marc Deslauriers <email address hidden>  Mon, 06 Jul 2015 09:05:05 -0400
  • php5 (5.6.4+dfsg-4ubuntu6) vivid; urgency=medium
    
      * SECURITY UPDATE: potential remote code execution vulnerability when
        used with the Apache 2.4 apache2handler
        - debian/patches/bug69218.patch: perform proper cleanup in
          sapi/apache2handler/sapi_apache2.c.
        - CVE number pending
      * SECURITY UPDATE: buffer overflow when parsing tar/zip/phar
        - debian/patches/bug69441.patch: check lengths in
          ext/phar/phar_internal.h.
        - CVE number pending
      * SECURITY UPDATE: buffer overflow in unserialize when parsing Phar
        - debian/patches/CVE-2015-2783.patch: properly check lengths in
          ext/phar/phar.c, ext/phar/phar_internal.h.
        - CVE-2015-2783
     -- Marc Deslauriers <email address hidden>   Fri, 17 Apr 2015 05:15:49 -0400