php5-odbc_5.4.45-0+deb7u2_amd64.deb


Advertisement

Description

php5-odbc - ODBC module for php5

Distribution: Debian 7 (Wheezy)
Repository: Debian Main amd64
Package name: php5-odbc
Package version: 5.4.45
Package release: 0+deb7u2
Package architecture: amd64
Package type: deb
Installed size: 95 B
Download size: 36.19 KB
Official Mirror: ftp.br.debian.org
This package provides a module for database access through ODBC drivers. It uses the unixODBC library as an ODBC provider. It also contains the pdo_odbc module, for use with the PHP Data Object extension. PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML.

    Download

    Source package: php5

    Install Howto

    1. Update the package index:
      # sudo apt-get update
    2. Install php5-odbc deb package:
      # sudo apt-get install php5-odbc

    Files

    • /usr/lib/php5/20100525/odbc.so
    • /usr/lib/php5/20100525/pdo_odbc.so
    • /usr/share/doc/php5-odbc
    • /usr/share/php5/odbc/odbc.ini
    • /usr/share/php5/odbc/pdo_odbc.ini

    Changelog

    2015-10-04 - Ondřej Surý <ondrej@debian.org> php5 (5.4.45-0+deb7u2) wheezy-security; urgency=high * Merge security updates from PHP 5.5.30 into PHP 5.4.45 - Phar: . Fixed bug #69720 (Null pointer dereference in phar_get_fp_offset()). . Fixed bug #70433 (Uninitialized pointer in phar_make_dirstream when zip entry filename is "/"). * Add a notice about PHP 5.4 EOL to d/NEWS

    2015-09-07 - Ondřej Surý <ondrej@debian.org> php5 (5.4.45-0+deb7u1) wheezy-security; urgency=medium * New upstream version 5.4.45 - Core: . Fixed bug #70172 (Use After Free Vulnerability in unserialize()). . Fixed bug #70219 (Use after free vulnerability in session deserializer). - EXIF: . Fixed bug #70385 (Buffer over-read in exif_read_data with TIFF IFD tag byte value of 32 bytes). - hash: . Fixed bug #70312 (HAVAL gives wrong hashes in specific cases). - PCRE: . Fixed bug #70345 (Multiple vulnerabilities related to PCRE functions). - SOAP: . Fixed bug #70388 (SOAP serialize_function_call() type confusion / RCE). - SPL: . Fixed bug #70365 (Use-after-free vulnerability in unserialize() with SplObjectStorage). . Fixed bug #70366 (Use-after-free vulnerability in unserialize() with SplDoublyLinkedList). - XSLT: . Fixed bug #69782 (NULL pointer dereference). - ZIP: . Fixed bug #70350 (ZipArchive::extractTo allows for directory traversal when creating directories). * Rebase patches on top of 5.4.45 release

    2015-08-16 - Ondřej Surý <ondrej@debian.org> php5 (5.4.44-0+deb7u1) wheezy-security; urgency=medium * New upstream version 5.4.44 - Core: . Fixed bug #69793 (Remotely triggerable stack exhaustion via recursive method calls). . Fixed bug #69892 (Different arrays compare indentical due to integer key truncation). . Fixed bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref). - OpenSSL: . Fixed bug #70014 (openssl_random_pseudo_bytes() is not cryptographically secure). - Phar: . Improved fix for bug #69441. . Fixed bug #70019 (Files extracted from archive may be placed outside of destination directory). - SOAP: . Fixed bug #70081 (SoapClient info leak / null pointer dereference via multiple type confusions). - SPL: . Fixed bug #70068 (Dangling pointer in the unserialization of ArrayObject items). . Fixed bug #70166 (Use After Free Vulnerability in unserialize() with SPLArrayObject). . Fixed bug #70168 (Use After Free Vulnerability in unserialize() with SplObjectStorage). . Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList). * New upstream version 5.4.43 - Core: . Fixed bug #69768 (escapeshell*() doesn't cater to !). . Fixed bug #69874 (Can't set empty additional_headers for mail()), regression from fix to bug #68776. - Mysqlnd: . Fixed bug #69669 (mysqlnd is vulnerable to BACKRONYM) (CVE-2015-3152). - Phar: . Fixed bug #69958 (Segfault in Phar::convertToData on invalid file). . Fixed bug #69923 (Buffer overflow and stack smashing error in phar_fix_filepath). * Rebase patches on top of 5.4.44 release

    Advertisement
    Advertisement