Sorry, my listing of cURL exploit is not quite accurate, here's an updated version with that and some other fixes (let that be a lesson for you, not to post hastefully and in anger ;-) Impact: Fixed possible stack buffer overflow in FastCGI SAPI Impact:Potential DOS and remote code execution if using FastCGI Updated PCRE to deal with issues fixed in USN-581-1 Impact:Potential DOS and remote code execution Fixes CVE-2008-0599 Impact:Potential DOS and remote code execution Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz. Impact: Potential overwriting or stealing files on the server if cURL is in use Properly address incomplete multibyte chars inside escapeshellcmd() Impact: Bypassing character based filtering, leading to potentially remotely running arbitrary commands on the shell
-- Please roll out security fixes from PHP 5.2.6 https://bugs.launchpad.net/bugs/227464 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs