For what it's worth, I used the patches from the Debian Lenny php5 package without modification to backport to Hardy. The resulting package is available in my PPA: <https://launchpad.net/~malept/+archive>. The package also contains the patch for CVE-2008-5557, and an updated PEAR installation.
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-5557 -- CVE-2008-3658,2008-3659,2008-3660 https://bugs.launchpad.net/bugs/286851 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs