Multiple vulnerabilities has been found and corrected in php:
	The (1) htmlentities and (2) htmlspecialchars functions in PHP before
	5.2.5 accept partial multibyte sequences, which has unknown impact and
	attack vectors, a different issue than CVE-2006-5465 (CVE-2007-5898).
	The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0,
	5.2.10, and earlier versions allows context-specific attackers to
	obtain sensitive information (memory contents) and cause a PHP crash
	by using the ini_set function to declare a variable, then using the
	ini_restore function to restore the variable (CVE-2009-2626).
	The htmlspecialchars function in PHP before 5.2.12 does not properly
	handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences,
	and (3) invalid EUC-JP sequences, which allows remote attackers to
	conduct cross-site scripting (XSS) attacks by placing a crafted byte
	sequence before a special character (CVE-2009-4142).
The updated packages have been patched to correct these issues…
 
                
