UbuntuUpdates.org

Package "php7.2-pspell"

Name: php7.2-pspell

Description:

pspell module for PHP

Latest version: 7.2.24-0ubuntu0.18.04.17
Release: bionic (18.04)
Level: updates
Repository: main
Head package: php7.2
Homepage: http://www.php.net/

Links


Download "php7.2-pspell"


Other versions of "php7.2-pspell" in Bionic

Repository Area Version
security main 7.2.24-0ubuntu0.18.04.17

Changelog

Version: 7.2.24-0ubuntu0.18.04.17 2023-02-28 17:06:53 UTC

  php7.2 (7.2.24-0ubuntu0.18.04.17) bionic-security; urgency=medium

  * SECURITY UPDATE: password_verify() accepts invalid Blowfish hashes
    - debian/patches/CVE-2023-0567-1.patch: fix validation of malformed
      BCrypt hashes in ext/standard/crypt_blowfish.c,
      ext/standard/tests/crypt/bcrypt_salt_dollar.phpt.
    - debian/patches/CVE-2023-0567-2.patch: fix possible buffer overread in
      php_crypt() in ext/standard/crypt.c,
      ext/standard/tests/password/password_bcrypt_short.phpt.
    - CVE-2023-0567
  * SECURITY UPDATE: off-by-one in core path resolution function
    - debian/patches/CVE-2023-0568.patch: fix array overrun when appending
      slash to paths in ext/dom/document.c, ext/xmlreader/php_xmlreader.c,
      main/fopen_wrappers.c.
    - CVE-2023-0568
  * SECURITY UPDATE: DoS via excessive number of parts in HTTP form upload
    - debian/patches/CVE-2023-0662-1.patch: introduce
      max_multipart_body_parts INI in main/main.c, main/rfc1867.c.
    - debian/patches/CVE-2023-0662-2.patch: fix repeated warning for file
      uploads limit exceeding in main/rfc1867.c.
    - CVE-2023-0662

 -- Marc Deslauriers <email address hidden> Thu, 23 Feb 2023 08:29:25 -0500

Source diff to previous version
CVE-2023-0567 In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3 ...
CVE-2023-0568 In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolv
CVE-2023-0662 In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consump

Version: 7.2.24-0ubuntu0.18.04.16 2023-01-23 16:07:49 UTC

  php7.2 (7.2.24-0ubuntu0.18.04.16) bionic-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-31631.patch: fix check
      unquotedlen size in ext/pdo_sqlite/sqlite_driver.c.
    - CVE-2022-31631

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 10 Jan 2023 12:47:23 -0300

Source diff to previous version

Version: 7.2.24-0ubuntu0.18.04.15 2022-11-08 18:06:21 UTC

  php7.2 (7.2.24-0ubuntu0.18.04.15) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-31628-1.patch: adding a recursion limit
      in ext/phar/phar.c, ext/phar/tests/bug81726.phpt.
    - debian/source/include-binaries: add ext/phar/tests/bug81726.gz.
    - debian/patches/CVE-2022-31628-2.patch: avoid a second check in
      ext/phar/phar.c.
    - CVE-2022-31628
  * SECURITY UPDATE: Cookie injection
    - debian/patches/CVE-2022-31629.patch: don't mangle HTTP
      variable names that clash with ones that have a specific semantic
      meaning in ext/standard/test/bug81727.phpt,
      main/php_variables.c.
    - CVE-2022-31629
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      hash_update() on long parameter in
      ext/hash/sha3/generic32lc/KeccakSponge.inc,
      ext/hash/sha3/generic64lc/KeccakSponge.inc.
    - CVE-2022-37454

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 02 Nov 2022 06:09:52 -0300

Source diff to previous version
CVE-2022-31628 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infini
CVE-2022-31629 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute

Version: 7.2.24-0ubuntu0.18.04.13 2022-07-07 23:06:24 UTC

  php7.2 (7.2.24-0ubuntu0.18.04.13) bionic-security; urgency=medium

  * SECURITY REGRESSION: Incomplete fix for CVE-2022-31625 (LP: #1980550)
    - debian/patches/CVE-2022-31625-2.patch: include the fix for not
      freeing parameters which haven't initialized yet in
      ext/pgsql/pgsql.c in other methods.

 -- Rodrigo Figueiredo Zaiden <email address hidden> Wed, 06 Jul 2022 09:23:22 -0300

Source diff to previous version
1980550 Incomplete fix for CVE-2022-31625
CVE-2022-31625 In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters t

Version: 7.2.24-0ubuntu0.18.04.12 2022-06-15 14:06:21 UTC

  php7.2 (7.2.24-0ubuntu0.18.04.12) bionic-security; urgency=medium

  * SECURITY UPDATE: RCE via Uninitialized array in pg_query_params()
    - debian/patches/CVE-2022-31625.patch: don't free parameters which
      haven't initialized yet in ext/pgsql/pgsql.c,
      ext/pgsql/tests/bug81720.phpt.
    - CVE-2022-31625
  * SECURITY UPDATE: RCE via mysqlnd/pdo password buffer overflow
    - debian/patches/CVE-20022-31626.patch: properly calculate size in
      ext/mysqlnd/mysqlnd_wireprotocol.c.
    - CVE-2022-31626

 -- Marc Deslauriers <email address hidden> Mon, 13 Jun 2022 09:41:53 -0400




About   -   Send Feedback to @ubuntu_updates