Mandriva Linux Security Advisory 2011-004 - Multiple format string vulnerabilities in the phar extension in PHP 5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive information and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush, phar_parse_url, or phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers errors in the php_stream_wrapper_log_error function. The updated packages have been upgraded to the latest version and patched to correct this issue.
cc0b39fb95de35b1449b811335b5e9616ac2bf267eaceb0d0502416b54b87310
Ubuntu Security Notice 989-1 - Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc requests. It was discovered that the pseudorandom number generator in PHP did not provide the expected entropy. It was discovered that PHP did not properly handle directory pathnames that lacked a trailing slash character. Grzegorz Stachowiak discovered that the PHP session extension did not properly handle semicolon characters. Stefan Esser discovered that PHP incorrectly decoded remote HTTP chunked encoding streams. Various other issues were also addressed.
39223359acd2eea854bfefcc60f483e06e1a0cd1e0a9f2252a3448603f64be5c