CVE-2011-1938
Bug #813110 reported by
Shaun Duncan
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
php5 (Ubuntu) |
Fix Released
|
Low
|
Unassigned | ||
Lucid |
Fix Released
|
Low
|
Steve Beattie | ||
Maverick |
Fix Released
|
Low
|
Steve Beattie | ||
Natty |
Fix Released
|
Low
|
Steve Beattie | ||
Oneiric |
Fix Released
|
Low
|
Unassigned |
Bug Description
PHP version 5.3.6 (5.3.6-11ubuntu1) contains a security flaw that allows a potential buffer overflow with function socket_connect. Patch should be applied via http://
visibility: | private → public |
Changed in php5 (Ubuntu Lucid): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in php5 (Ubuntu Maverick): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in php5 (Ubuntu Natty): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in php5 (Ubuntu Oneiric): | |
importance: | Undecided → Low |
status: | New → Confirmed |
Changed in php5 (Ubuntu Lucid): | |
assignee: | nobody → Angel Abad (angelabad) |
status: | Confirmed → In Progress |
Changed in php5 (Ubuntu Maverick): | |
assignee: | nobody → Angel Abad (angelabad) |
status: | Confirmed → In Progress |
Changed in php5 (Ubuntu Natty): | |
assignee: | nobody → Angel Abad (angelabad) |
status: | Confirmed → In Progress |
To post a comment you must log in.
Fixed in 5.3.6-13ubuntu1 upload.