For what it's worth, I used the patches from the Debian Lenny php5
package without modification to backport to Hardy.  The resulting
package is available in my PPA:
<https://launchpad.net/~malept/+archive>.  The package also contains the
patch for CVE-2008-5557, and an updated PEAR installation.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-5557

-- 
CVE-2008-3658,2008-3659,2008-3660
https://bugs.launchpad.net/bugs/286851
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to