-
php7.0 (7.0.18-0ubuntu0.16.10.1) yakkety; urgency=medium
* New upstream release 7.0.18
- LP: #1686237
- LP: #1674892
- Refresh patches for new upstream release
* Drop:
- debian/patches/0048-Fix-pdo_pgsql.patch: Fixed #73959 - lastInsertId
fails to throw an exception in pdsql. Thanks to andrewnester
<email address hidden>. Closes LP #1658289.
[ Fixed upstream in 7.0.16 ]
- SECURITY REGRESSION: large mysql requests broken (LP #1668017)
+ debian/patches/fix_74021.patch: fix fetch_array with more than
MEDIUMBLOB in ext/mysqlnd/mysqlnd_wireprotocol.c, added tests to
ext/mysqli/tests/bug73800.phpt, ext/mysqli/tests/bug74021.phpt.
[ Fixed upstream in 7.0.17 ]
-- Nishanth Aravamudan <email address hidden> Wed, 26 Apr 2017 16:55:19 -0700
-
php7.0 (7.0.15-0ubuntu0.16.10.4) yakkety-security; urgency=medium
* SECURITY REGRESSION: large mysql requests broken (LP: #1668017)
- debian/patches/fix_74021.patch: fix fetch_array with more than
MEDIUMBLOB in ext/mysqlnd/mysqlnd_wireprotocol.c, added tests to
ext/mysqli/tests/bug73800.phpt, ext/mysqli/tests/bug74021.phpt.
-- Marc Deslauriers <email address hidden> Wed, 01 Mar 2017 10:50:27 -0500
-
php7.0 (7.0.15-0ubuntu0.16.10.3) yakkety; urgency=medium
* debian/patches/fix_74021.patch: Fix fetch_array with more than
MEDIUMBLOB. Thanks to andrewnester <email address hidden>.
Closes LP: #1668017.
-- Nishanth Aravamudan <email address hidden> Tue, 28 Feb 2017 13:20:57 -0800
-
php7.0 (7.0.15-0ubuntu0.16.10.2) yakkety-security; urgency=medium
* No change rebuild in the -security pocket.
-- Marc Deslauriers <email address hidden> Thu, 23 Feb 2017 08:42:19 -0500
-
php7.0 (7.0.15-0ubuntu0.16.10.1) yakkety; urgency=medium
* New upstream release
- LP: #1663405
- Refresh patches for new upstream release.
* debian/patches/0048-Fix-pdo_pgsql.patch: Fixed #73959 - lastInsertId
fails to throw an exception in pdsql. Thanks to andrewnester
<email address hidden>. Closes LP: #1658289.
-- Nishanth Aravamudan <email address hidden> Tue, 14 Feb 2017 14:44:43 -0800
-
php7.0 (7.0.13-0ubuntu0.16.10.1) yakkety; urgency=medium
* New upstream release
- LP: #1645431
- Refresh patches for new upstream release.
* Drop:
- SECURITY UPDATE: proxy request header vulnerability (httpoxy)
+ debian/patches/CVE-2016-5385.patch: only use HTTP_PROXY from the
local environment in ext/standard/basic_functions.c, main/SAPI.c,
main/php_variables.c.
+ CVE-2016-5385
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: inadequate error handling in bzread()
+ debian/patches/CVE-2016-5399.patch: do not allow reading past error
read in ext/bz2/bz2.c.
+ CVE-2016-5399
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in the virtual_file_ex function
+ debian/patches/CVE-2016-6289.patch: properly check path_length in
Zend/zend_virtual_cwd.c.
+ CVE-2016-6289
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free in unserialize() with unexpected
session deserialization
+ debian/patches/CVE-2016-6290.patch: destroy var_hash properly in
ext/session/session.c, added test to ext/session/tests/bug72562.phpt.
+ CVE-2016-6290
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: out of bounds read in exif_process_IFD_in_MAKERNOTE
+ debian/patches/CVE-2016-6291.patch: add more bounds checks to
ext/exif/exif.c.
+ CVE-2016-6291
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: NULL pointer dereference in exif_process_user_comment
+ debian/patches/CVE-2016-6292.patch: properly handle encoding in
ext/exif/exif.c.
+ CVE-2016-6292
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: locale_accept_from_http out-of-bounds access
+ debian/patches/CVE-2016-6294.patch: check length in
ext/intl/locale/locale_methods.c, added test to
ext/intl/tests/bug72533.phpt.
+ CVE-2016-6294
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: use after free vulnerability in SNMP with GC and
unserialize()
+ debian/patches/CVE-2016-6295.patch: add new handler to
ext/snmp/snmp.c, add test to ext/snmp/tests/bug72479.phpt.
+ CVE-2016-6295
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: heap buffer overflow in simplestring_addn
+ debian/patches/CVE-2016-6296.patch: prevent overflows in
ext/xmlrpc/libxmlrpc/simplestring.*.
+ CVE-2016-6296
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: integer overflow in php_stream_zip_opener
+ debian/patches/CVE-2016-6297.patch: use size_t in
ext/zip/zip_stream.c.
+ CVE-2016-6297
[ Fixed in 7.0.9 ]
- debian/patches/fix_exif_tests.patch: fix exif test results after
security changes.
[ Fixed in 7.0.9 ]
- SECURITY UPDATE: denial of service or code execution via crafted
serialized data
+ debian/patches/CVE-2016-7124.patch: fix unserializing logic in
ext/session/session.c, ext/standard/var_unserializer.c*,
ext/wddx/wddx.c, added tests to
ext/standard/tests/serialize/bug72663.phpt,
ext/standard/tests/serialize/bug72663_2.phpt,
ext/standard/tests/serialize/bug72663_3.phpt.
+ CVE-2016-7124
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: arbitrary-type session data injection
+ debian/patches/CVE-2016-7125.patch: consume data even if not storing
in ext/session/session.c, added test to
ext/session/tests/bug72681.phpt.
+ CVE-2016-7125
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution in
imagegammacorrect function
+ debian/patches/CVE-2016-7127.patch: check gamma values in
ext/gd/gd.c, added test to ext/gd/tests/bug72730.phpt.
+ CVE-2016-7127
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: information disclosure via exif_process_IFD_in_TIFF
+ debian/patches/CVE-2016-7128.patch: properly handle thumbnails in
ext/exif/exif.c.
+ CVE-2016-7128
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
invalid ISO 8601 time value
+ debian/patches/CVE-2016-7129.patch: properly handle strings in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72749.phpt.
+ CVE-2016-7129
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
invalid base64 binary value
+ debian/patches/CVE-2016-7130.patch: properly handle string in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72750.phpt.
+ CVE-2016-7130
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
+ debian/patches/CVE-2016-7131.patch: added checks to ext/wddx/wddx.c,
added tests to ext/wddx/tests/bug72790.phpt,
ext/wddx/tests/bug72799.phpt.
+ CVE-2016-7131
+ CVE-2016-7132
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
long pathname
+ debian/patches/CVE-2016-7133.patch: fix memory allocator in
Zend/zend_alloc.c.
+ CVE-2016-7133
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
long string and curl_escape call
+ debian/patches/CVE-2016-7134.patch: check both curl_escape and
curl_unescape in ext/curl/interface.c.
+ CVE-2016-7134
[ Fixed in 7.0.10 ]
- SECURITY UPDATE: denial of service and possible code execution via
crafted field metadata in MySQL driver
+ debian/patches/CVE-2016-7412.patch: validate field length in
ext/mysqlnd/mysqlnd_wireprotocol.c.
+ CVE-2016-7412
[ Fixed in 7.0.11 ]
- SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
+ debian/patches/CVE-2016-7413.patch: fixed use-after-free in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72860.phpt.
+ CVE-2016-7413
[ Fixed in 7.0.11 ]
- SECURITY UPDATE: denial of service and possible code execution via
crafted PHAR archive
+ debian/patches/CVE-2016-7414.patch: validate signatures in
ext/phar/util.c, ext/phar/zip.c.
+ CVE-2016-7414
[ Fixed in 7.0.11 ]
- SECURITY UPDATE: denial of service and possible code execution via
MessageFormatter::formatMessage call with a long first argument
+ debian/patches/CVE-2016-7416.patch: added locale length check to
ext/intl/msgformat/msgformat_format.c.
+ CVE-2016-7416
[ Fixed in 7.0.11 ]
- SECURITY UPDATE: denial of service or code execution via crafted
serialized data
+ debian/patches/CVE-2016-7417.patch: added type check to
ext/spl/spl_array.c, added test to ext/spl/tests/bug73029.phpt, fix
test in ext/spl/tests/bug70068.phpt.
+ CVE-2016-7417
[ Fixed in 7.0.11 ]
- SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
+ debian/patches/CVE-2016-7418.patch: fix out-of-bounds read in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug73065.phpt.
+ CVE-2016-7418
[ Fixed in 7.0.11 ]
-- Nishanth Aravamudan <email address hidden> Mon, 28 Nov 2016 12:14:42 -0800
-
php7.0 (7.0.8-3ubuntu3) yakkety; urgency=medium
* SECURITY UPDATE: denial of service or code execution via crafted
serialized data
- debian/patches/CVE-2016-7124.patch: fix unserializing logic in
ext/session/session.c, ext/standard/var_unserializer.c*,
ext/wddx/wddx.c, added tests to
ext/standard/tests/serialize/bug72663.phpt,
ext/standard/tests/serialize/bug72663_2.phpt,
ext/standard/tests/serialize/bug72663_3.phpt.
- CVE-2016-7124
* SECURITY UPDATE: arbitrary-type session data injection
- debian/patches/CVE-2016-7125.patch: consume data even if not storing
in ext/session/session.c, added test to
ext/session/tests/bug72681.phpt.
- CVE-2016-7125
* SECURITY UPDATE: denial of service and possible code execution in
imagegammacorrect function
- debian/patches/CVE-2016-7127.patch: check gamma values in
ext/gd/gd.c, added test to ext/gd/tests/bug72730.phpt.
- CVE-2016-7127
* SECURITY UPDATE: information disclosure via exif_process_IFD_in_TIFF
- debian/patches/CVE-2016-7128.patch: properly handle thumbnails in
ext/exif/exif.c.
- CVE-2016-7128
* SECURITY UPDATE: denial of service and possible code execution via
invalid ISO 8601 time value
- debian/patches/CVE-2016-7129.patch: properly handle strings in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72749.phpt.
- CVE-2016-7129
* SECURITY UPDATE: denial of service and possible code execution via
invalid base64 binary value
- debian/patches/CVE-2016-7130.patch: properly handle string in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72750.phpt.
- CVE-2016-7130
* SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
- debian/patches/CVE-2016-7131.patch: added checks to ext/wddx/wddx.c,
added tests to ext/wddx/tests/bug72790.phpt,
ext/wddx/tests/bug72799.phpt.
- CVE-2016-7131
- CVE-2016-7132
* SECURITY UPDATE: denial of service and possible code execution via
long pathname
- debian/patches/CVE-2016-7133.patch: fix memory allocator in
Zend/zend_alloc.c.
- CVE-2016-7133
* SECURITY UPDATE: denial of service and possible code execution via
long string and curl_escape call
- debian/patches/CVE-2016-7134.patch: check both curl_escape and
curl_unescape in ext/curl/interface.c.
- CVE-2016-7134
* SECURITY UPDATE: denial of service and possible code execution via
crafted field metadata in MySQL driver
- debian/patches/CVE-2016-7412.patch: validate field length in
ext/mysqlnd/mysqlnd_wireprotocol.c.
- CVE-2016-7412
* SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
- debian/patches/CVE-2016-7413.patch: fixed use-after-free in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug72860.phpt.
- CVE-2016-7413
* SECURITY UPDATE: denial of service and possible code execution via
crafted PHAR archive
- debian/patches/CVE-2016-7414.patch: validate signatures in
ext/phar/util.c, ext/phar/zip.c.
- CVE-2016-7414
* SECURITY UPDATE: denial of service and possible code execution via
MessageFormatter::formatMessage call with a long first argument
- debian/patches/CVE-2016-7416.patch: added locale length check to
ext/intl/msgformat/msgformat_format.c.
- CVE-2016-7416
* SECURITY UPDATE: denial of service or code execution via crafted
serialized data
- debian/patches/CVE-2016-7417.patch: added type check to
ext/spl/spl_array.c, added test to ext/spl/tests/bug73029.phpt, fix
test in ext/spl/tests/bug70068.phpt.
- CVE-2016-7417
* SECURITY UPDATE: denial of service and possible code execution via
malformed wddxPacket XML document
- debian/patches/CVE-2016-7418.patch: fix out-of-bounds read in
ext/wddx/wddx.c, added test to ext/wddx/tests/bug73065.phpt.
- CVE-2016-7418
-- Marc Deslauriers <email address hidden> Mon, 03 Oct 2016 15:48:48 -0400
-
php7.0 (7.0.8-3ubuntu2) yakkety; urgency=medium
* SECURITY UPDATE: proxy request header vulnerability (httpoxy)
- debian/patches/CVE-2016-5385.patch: only use HTTP_PROXY from the
local environment in ext/standard/basic_functions.c, main/SAPI.c,
main/php_variables.c.
- CVE-2016-5385
* SECURITY UPDATE: inadequate error handling in bzread()
- debian/patches/CVE-2016-5399.patch: do not allow reading past error
read in ext/bz2/bz2.c.
- CVE-2016-5399
* SECURITY UPDATE: integer overflow in the virtual_file_ex function
- debian/patches/CVE-2016-6289.patch: properly check path_length in
Zend/zend_virtual_cwd.c.
- CVE-2016-6289
* SECURITY UPDATE: use after free in unserialize() with unexpected
session deserialization
- debian/patches/CVE-2016-6290.patch: destroy var_hash properly in
ext/session/session.c, added test to ext/session/tests/bug72562.phpt.
- CVE-2016-6290
* SECURITY UPDATE: out of bounds read in exif_process_IFD_in_MAKERNOTE
- debian/patches/CVE-2016-6291.patch: add more bounds checks to
ext/exif/exif.c.
- CVE-2016-6291
* SECURITY UPDATE: NULL pointer dereference in exif_process_user_comment
- debian/patches/CVE-2016-6292.patch: properly handle encoding in
ext/exif/exif.c.
- CVE-2016-6292
* SECURITY UPDATE: locale_accept_from_http out-of-bounds access
- debian/patches/CVE-2016-6294.patch: check length in
ext/intl/locale/locale_methods.c, added test to
ext/intl/tests/bug72533.phpt.
- CVE-2016-6294
* SECURITY UPDATE: use after free vulnerability in SNMP with GC and
unserialize()
- debian/patches/CVE-2016-6295.patch: add new handler to
ext/snmp/snmp.c, add test to ext/snmp/tests/bug72479.phpt.
- CVE-2016-6295
* SECURITY UPDATE: heap buffer overflow in simplestring_addn
- debian/patches/CVE-2016-6296.patch: prevent overflows in
ext/xmlrpc/libxmlrpc/simplestring.*.
- CVE-2016-6296
* SECURITY UPDATE: integer overflow in php_stream_zip_opener
- debian/patches/CVE-2016-6297.patch: use size_t in
ext/zip/zip_stream.c.
- CVE-2016-6297
* debian/patches/fix_exif_tests.patch: fix exif test results after
security changes.
-- Marc Deslauriers <email address hidden> Wed, 27 Jul 2016 08:14:20 -0400
-
php7.0 (7.0.8-3ubuntu1) yakkety; urgency=low
* Merge with Debian unstable (LP: #1596735). Remaining changes:
- Drop dh-php from Recommends to Suggests so it can be demoted to
universe (LP: #1590623).
+ dh-php has gained a dependency on xml2 which is in universe.
php7.0 (7.0.8-3) unstable; urgency=medium
[ Ondřej Surý ]
* Improve libapache2-mod-php script to switch MPM only on fresh installs
* libapache2-mod-phpX.Y now recommends apache2 package (as this is what
most people want anyway)
[ Marc Deslauriers ]
* Re-enable test suite
[ Ondřej Surý ]
* Update d/setup-mysql.sh to support MySQL 5.5, 5.6 and 5.7 and
build-depend on libnss-myhostname so mysql_install_db --force option
is not needed
php7.0 (7.0.8-2) unstable; urgency=medium
[ Thomas Häber ]
* fix typo in Tighten depends on pcre3 to workaround symbols brokeness
php7.0 (7.0.8-1) unstable; urgency=medium
* Tighten depends on pcre3 to workaround symbols brokeness
* Imported Upstream version 7.0.8
* Rebase patches on top of 7.0.8 release
* Adjust tidy extension for tidy-html5
php7.0 (7.0.7-5) unstable; urgency=medium
* Add Breaks: gforge-common (<< 6) to php7.0-common (Closes: #827413)
-- Nishanth Aravamudan <email address hidden> Mon, 27 Jun 2016 16:33:17 -0700
-
php7.0 (7.0.7-4ubuntu2) yakkety; urgency=medium
* Actually drop dh-php from Recommends to Suggests by modifying
d/control.in as well (LP: #1590623).
-- Nishanth Aravamudan <email address hidden> Thu, 09 Jun 2016 19:56:16 -0700
-
php7.0 (7.0.7-4ubuntu1) yakkety; urgency=medium
* Drop dh-php from Recommends to Suggests so it can be demoted to
universe (LP: #1590623).
- dh-php has gained a dependency on xml2 which is in universe.
-- Nishanth Aravamudan <email address hidden> Wed, 08 Jun 2016 17:13:12 -0700
-
php7.0 (7.0.7-4) unstable; urgency=medium
* Don't break apache2 configuration if setenvif_module is not enabled
(Closes: #825933)
* Add notice about apache2 notices when apache2 package is installed
-- Ondřej Surý <email address hidden> Fri, 03 Jun 2016 13:22:25 +0200
-
php7.0 (7.0.7-3) unstable; urgency=medium
* The alternative base-files dependency to *systemd* deps is also
required only on linux-any
-- Ondřej Surý <email address hidden> Fri, 27 May 2016 13:21:07 +0200
-
php7.0 (7.0.4-7ubuntu4) yakkety; urgency=medium
* debian/patches/0053-backport-68ebfc87.patch: Fix bug #71624,
PHP_MODE_PROCESS_STDIN (CLI SAPI called with '-R') did not properly
set $argi and $argn. Closes LP: #1572465.
-- Nishanth Aravamudan <email address hidden> Wed, 20 Apr 2016 19:05:43 -0700
-
php7.0 (7.0.4-7ubuntu3) yakkety; urgency=medium
* No-change rebuild for libicu soname change.
-- Matthias Klose <email address hidden> Fri, 22 Apr 2016 22:59:16 +0000
-
php7.0 (7.0.4-7ubuntu2) xenial; urgency=medium
* debian/patches/0052-backport-186844be.patch: Fix bug #71695: Global
variables are resreved before execution. Closes LP: #1569509.
-- Nishanth Aravamudan <email address hidden> Wed, 13 Apr 2016 12:45:21 -0700