Processing commands for [EMAIL PROTECTED]: > tag 359907 + fixed Bug#359907: Security: Binary safety issue in html_entity_decode() may leak memory Tags were: security Tags added: fixed
> tag 361914 + fixed Bug#361914: [CVE-2006-0996] phpinfo() Cross Site Scripting Tags were: security Tags added: fixed > tag 361915 + fixed Bug#361915: [CVE-2006-1608] copy() Safe Mode Bypass Tags were: security Tags added: fixed > tag 361916 + fixed Bug#361916: [CVE-2006-1494] tempnam() open_basedir bypass Tags were: security Tags added: fixed > tag 361917 + fixed Bug#361917: [CVE-2006-1549] PHP allows local users to cause a crash by defining and executing a recursive function. Tags were: security Tags added: fixed > tag 365312 + fixed Bug#365312: CVE-2006-1990/CVE-2006-1991: Security vulnerabilities in php Tags were: security Tags added: fixed > tag 366109 + fixed Bug#366109: php5: PHP 5.1.3, 5.1.4 released There were no tags set. Tags added: fixed > tag 368595 + fixed Bug#368595: php5: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function Tags were: security Tags added: fixed > quit Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]