<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git/meta-webserver/recipes-php/modphp, branch krogoth-next</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=krogoth-next</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=krogoth-next'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2015-01-08T11:04:26+00:00</updated>
<entry>
<title>modphp: remove</title>
<updated>2015-01-08T11:04:26+00:00</updated>
<author>
<name>Paul Eggleton</name>
<email>paul.eggleton@linux.intel.com</email>
</author>
<published>2015-01-01T23:34:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=06af52095b5be1cb21a7dc9a6a6e05d01f6e7a00'/>
<id>urn:sha1:06af52095b5be1cb21a7dc9a6a6e05d01f6e7a00</id>
<content type='text'>
This is now built out of the standard php recipe.

Signed-off-by: Paul Eggleton &lt;paul.eggleton@linux.intel.com&gt;
</content>
</entry>
<entry>
<title>PNBLACKLIST: use weak assignments</title>
<updated>2014-12-17T11:55:40+00:00</updated>
<author>
<name>Martin Jansa</name>
<email>Martin.Jansa@gmail.com</email>
</author>
<published>2014-12-06T07:01:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=96a92761c0a1bb2317fa4ea422c32e4473405103'/>
<id>urn:sha1:96a92761c0a1bb2317fa4ea422c32e4473405103</id>
<content type='text'>
* this makes it easier to unblacklist it from local.conf which
  is parsed before the recipes

Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp: Security Advisory - php - CVE-2014-3597</title>
<updated>2014-10-30T08:00:07+00:00</updated>
<author>
<name>Yue Tao</name>
<email>Yue.Tao@windriver.com</email>
</author>
<published>2014-10-23T08:29:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=8d50adfe536f3dc94313318f834946e634441c8a'/>
<id>urn:sha1:8d50adfe536f3dc94313318f834946e634441c8a</id>
<content type='text'>
Multiple buffer overflows in the php_parserr function in
ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow
remote DNS servers to cause a denial of service (application crash) or
possibly execute arbitrary code via a crafted DNS record, related to the
dns_get_record function and the dn_expand function. NOTE: this issue
exists because of an incomplete fix for CVE-2014-4049.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3597

Signed-off-by: Yue Tao &lt;Yue.Tao@windriver.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp: Security Advisory - php - CVE-2014-3587</title>
<updated>2014-10-30T08:00:07+00:00</updated>
<author>
<name>Yue Tao</name>
<email>Yue.Tao@windriver.com</email>
</author>
<published>2014-10-23T08:29:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=700078d6646c79a784cec2cb0a491687e3edd21b'/>
<id>urn:sha1:700078d6646c79a784cec2cb0a491687e3edd21b</id>
<content type='text'>
Integer overflow in the cdf_read_property_info function in cdf.c in file
through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and
5.5.x before 5.5.16, allows remote attackers to cause a denial of
service (application crash) via a crafted CDF file. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2012-1571.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3587

Signed-off-by: Yue Tao &lt;Yue.Tao@windriver.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp: Security Advisory - php - CVE-2014-5120</title>
<updated>2014-10-30T08:00:07+00:00</updated>
<author>
<name>Yue Tao</name>
<email>Yue.Tao@windriver.com</email>
</author>
<published>2014-10-23T08:29:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=81aecee0eda7600e6a6ae3f8264b2a1bc7a57f04'/>
<id>urn:sha1:81aecee0eda7600e6a6ae3f8264b2a1bc7a57f04</id>
<content type='text'>
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before
5.5.16 does not ensure that pathnames lack %00 sequences, which might
allow remote attackers to overwrite arbitrary files via crafted input to
an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif,
(4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5120

Signed-off-by: Yue Tao &lt;Yue.Tao@windriver.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp, xdebug: blacklist because of conflict with php</title>
<updated>2014-10-27T11:50:09+00:00</updated>
<author>
<name>Martin Jansa</name>
<email>Martin.Jansa@gmail.com</email>
</author>
<published>2014-10-07T01:08:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=0558ea06b14c45aabe04fa92df4f2765dac6aa49'/>
<id>urn:sha1:0558ea06b14c45aabe04fa92df4f2765dac6aa49</id>
<content type='text'>
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp: using PKGCONFIG and PACKAGECONFIG for libxml and soap</title>
<updated>2014-10-14T09:48:58+00:00</updated>
<author>
<name>Roy.Li</name>
<email>rongqing.li@windriver.com</email>
</author>
<published>2014-10-13T04:39:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=d1951db22a9971a1bb7cf25810ec3bdc9669a6f1'/>
<id>urn:sha1:d1951db22a9971a1bb7cf25810ec3bdc9669a6f1</id>
<content type='text'>
Signed-off-by: Roy.Li &lt;rongqing.li@windriver.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
<entry>
<title>modphp: update to 5.5.15</title>
<updated>2014-08-10T16:15:22+00:00</updated>
<author>
<name>Paul Eggleton</name>
<email>paul.eggleton@linux.intel.com</email>
</author>
<published>2014-07-15T08:32:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=e559dd7da394bc7c6242c38f86417d1088163d71'/>
<id>urn:sha1:e559dd7da394bc7c6242c38f86417d1088163d71</id>
<content type='text'>
LIC_FILES_CHKSUM changed since the copyright year changed.

Signed-off-by: Paul Eggleton &lt;paul.eggleton@linux.intel.com&gt;
</content>
</entry>
<entry>
<title>modphp: update to 5.5.12</title>
<updated>2014-05-13T11:03:39+00:00</updated>
<author>
<name>Paul Eggleton</name>
<email>paul.eggleton@linux.intel.com</email>
</author>
<published>2014-04-30T15:11:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=31e7fb3e150f816036b9c52d0b4abad1c88899df'/>
<id>urn:sha1:31e7fb3e150f816036b9c52d0b4abad1c88899df</id>
<content type='text'>
Signed-off-by: Paul Eggleton &lt;paul.eggleton@linux.intel.com&gt;
</content>
</entry>
<entry>
<title>modphp: fix for S != B</title>
<updated>2014-05-03T18:47:03+00:00</updated>
<author>
<name>Paul Eggleton</name>
<email>paul.eggleton@linux.intel.com</email>
</author>
<published>2014-05-01T10:38:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=09ec4b8eaf9950824bc2bb9a1364e65b9a47bc54'/>
<id>urn:sha1:09ec4b8eaf9950824bc2bb9a1364e65b9a47bc54</id>
<content type='text'>
Signed-off-by: Paul Eggleton &lt;paul.eggleton@linux.intel.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
</feed>
