Fedora Legacy Test Update Notification: php

Marc Deslauriers marcdeslauriers at videotron.ca
Tue Mar 1 01:36:56 UTC 2005


The packages have been updated to add CAN-2004-1392 and another
unserialize function issue that doesn't have a CAN number.

---------------------------------------------------------------------
Fedora Legacy Test Update Notification
FEDORALEGACY-2005-2344
Bugzilla https://bugzilla.fedora.us/show_bug.cgi?id=2344
2005-02-28
---------------------------------------------------------------------

Name        : php
Versions    : rh7.3: php-4.1.2-7.3.14.legacy
Versions    : rh9: php-4.2.2-17.10.legacy
Versions    : fc1: php-4.3.10-1.1.legacy
Summary     : The PHP HTML-embedded scripting language.
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts. The
mod_php module enables the Apache Web server to understand and process
the embedded PHP language in Web pages.

---------------------------------------------------------------------
Update Information:

Updated php packages that fix various security issues are now available.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

An information disclosure bug was discovered in the parsing of "GPC"
variables in PHP (query strings or cookies, and POST form data). If
particular scripts used the values of the GPC variables, portions of the
memory space of an httpd child process could be revealed to the client.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0958 to this issue.

A file access bug was discovered in the parsing of "multipart/form-data"
forms, used by PHP scripts which allow file uploads. In particular
configurations, some scripts could allow a malicious client to upload
files to an arbitrary directory where the "apache" user has write
access. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0959 to this issue.

Flaws were found in shmop_write, pack, and unpack PHP functions. These
functions are not normally passed user supplied data, so would require a
malicious PHP script to be exploited. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-1018 to
this issue.

Flaws including possible information disclosure, double free, and
negative reference index array underflow were found in the
deserialization code of PHP. PHP applications may use the unserialize
function on untrusted user data, which could allow a remote attacker to
gain access to memory or potentially execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2004-1019 to this issue.

A flaw in the exif extension of PHP was found which lead to a stack
overflow. An attacker could create a carefully crafted image file in
such a way that if parsed by a PHP script using the exif extension it
could cause a crash or potentially execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2004-1065 to this issue.

A flaw in the PHP cURL functions allows remote attackers to bypass the
open_basedir setting and read arbitrary files via a file: URL argument
to the curl_init function. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-1392 to this
issue.

Users of PHP should upgrade to these updated packages, which contain
fixes for these issues.

---------------------------------------------------------------------
7.3 changelog:
* Sat Feb 26 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.1.2-7.3.14.legacy
- Added security patch for CAN-2004-1392

* Mon Jan 31 2005 John Dalbec <jpdalbec at ysu.edu> 4.1.2-7.3.13.legacy
- Fix typo in OpenPKG backport patch (filename -> filenamebuf)
- * Sun Jan 23 2005 Leonard den Ottolander <leonard * den ottolander nl> 
4.1.2-7.3.11.legacy
   - fix possible double-free in unserializer (CAN-2004-1019)
   - fix integer overflows in pack() (CAN-2004-1018, requires
     malicious script to exploit)
- Remove redundant CAN-2004-1018 sections from OpenPKG backport patch

* Wed Jan 05 2005 Pekka Savola <pekkas at netcore.fi> 4.1.2-6.3.12.legacy
- Use a more complete patch, some parts had been left off
   by accident.

* Mon Jan 03 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.1.2-7.3.11.legacy
- Added OpenPKG patch backport for CAN-2004-1018, CAN-2004-1019, 
CAN-2004-1063,
   CAN-2004-1064 and CAN-2004-1065

9 changelog:
* Sun Feb 27 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.2.2-17.10.legacy
- Rebuilt

* Sat Feb 26 2005 Pekka Savola <pekkas at netcore.fi> 4.2.2-17.9.legacy.3
- Fix CAN-2004-1392, from Ubuntu (#2344)

* Sat Feb 26 2005 Pekka Savola <pekkas at netcore.fi> 4.2.2-17.9.legacy.2
- a more complete patch of unserializer, overhaul it to 4.3.10 like RHEL3

* Wed Dec 22 2004 Pekka Savola <pekkas at netcore.fi> 4.2.2-17.9.legacy
- Replace the previous patches with a complete OpenPKG backport, fixing the
issues (and more of them) more extensively.

* Tue Dec 21 2004 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.2.2-17.8.legacy
- Added security patches for CAN-2004-1019 and CAN-2004-1065

fc1 changelog:
* Sat Feb 26 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.3.10-1.1.legacy
- Updated to 4.3.10 to completely fix security issues
- Added patch for CAN-2004-1392
- revert use of RTLD_GLOBAL in dlopen() calls (rh#127518)
- add another FD_SETSIZE workaround (rh#125258)
- revert upstream default php.ini changes since 4.3.6
- add libgd namespace fixes (rh#124530)

* Mon Feb 21 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.3.8-1.5.legacy
- Added missing gnupg BuildRequires

* Fri Feb 11 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.3.8-1.4.legacy
- Added missing sendmail, w3c-libwww-devel and flex BuildRequires

* Mon Jan 03 2005 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.3.8-1.3.legacy
- Added patches for CAN-2004-0958 and CAN-2004-0959

* Tue Dec 21 2004 Marc Deslauriers <marcdeslauriers at videotron.ca> 
4.3.8-1.2.legacy
- Added OpenPKG patch for CAN-2004-1018, CAN-2004-1019, CAN-2004-1063,
   CAN-2004-1064 and CAN-2004-1065

---------------------------------------------------------------------
This update can be downloaded from:
   http://download.fedoralegacy.org/
(sha1sums)

b88c0d83d4a9aeb974a6ee54ce66a27ecefa392a 
redhat/7.3/updates-testing/i386/php-4.1.2-7.3.14.legacy.i386.rpm
48fd82779841a679e84e93f8ef1b612965acb342 
redhat/7.3/updates-testing/i386/php-devel-4.1.2-7.3.14.legacy.i386.rpm
573aad4bab9f4f4399aedea743999020b3246614 
redhat/7.3/updates-testing/i386/php-imap-4.1.2-7.3.14.legacy.i386.rpm
1a18d347e68013d29586f6a8db8283bdf7f6ff66 
redhat/7.3/updates-testing/i386/php-ldap-4.1.2-7.3.14.legacy.i386.rpm
2a84f086225993aeccb0dfe2dd21ca8fcd78f26e 
redhat/7.3/updates-testing/i386/php-manual-4.1.2-7.3.14.legacy.i386.rpm
d856fcc947e9386db2116f581cd0faf9efa5cf39 
redhat/7.3/updates-testing/i386/php-mysql-4.1.2-7.3.14.legacy.i386.rpm
5621afdf4dd720ca24b489ccd115f6ead0b5343d 
redhat/7.3/updates-testing/i386/php-odbc-4.1.2-7.3.14.legacy.i386.rpm
41bc8b4cf9c357c8030c09c4454c0e2173e0c523 
redhat/7.3/updates-testing/i386/php-pgsql-4.1.2-7.3.14.legacy.i386.rpm
42bec2bd2e0f98fed8e01e82eef7a845c37020d2 
redhat/7.3/updates-testing/i386/php-snmp-4.1.2-7.3.14.legacy.i386.rpm
8c6cf550cb6b6f4a75742120f56c6b77ff3d49e4 
redhat/7.3/updates-testing/SRPMS/php-4.1.2-7.3.14.legacy.src.rpm
7fdeae44517dc2ef29fbb0480f9046fc6dadc8e3 
redhat/9/updates-testing/i386/php-4.2.2-17.10.legacy.i386.rpm
e9244f6732eb2c83128d91e57439e7cc36c3c982 
redhat/9/updates-testing/i386/php-devel-4.2.2-17.10.legacy.i386.rpm
054f45490faa2d6bc641b22bade7f3db92d07cde 
redhat/9/updates-testing/i386/php-imap-4.2.2-17.10.legacy.i386.rpm
76ade25210bb37b4757b535d48de39e8c2dec622 
redhat/9/updates-testing/i386/php-ldap-4.2.2-17.10.legacy.i386.rpm
53d0e83c9b10e9d84e0150c9dbdb70f4df3a930a 
redhat/9/updates-testing/i386/php-manual-4.2.2-17.10.legacy.i386.rpm
81ac7899358407bbd2c38baf7547136413970372 
redhat/9/updates-testing/i386/php-mysql-4.2.2-17.10.legacy.i386.rpm
cceed4ce195fa9ff864eb6561b7bfb6297eb5bff 
redhat/9/updates-testing/i386/php-odbc-4.2.2-17.10.legacy.i386.rpm
839c239b525265df7abaeac1c5f0c08092c74944 
redhat/9/updates-testing/i386/php-pgsql-4.2.2-17.10.legacy.i386.rpm
b1cd0eb61b109a2b5da15791b8781806b44c7efc 
redhat/9/updates-testing/i386/php-snmp-4.2.2-17.10.legacy.i386.rpm
fe9529ca28ff2663a9b520fd5e774cf931e0b135 
redhat/9/updates-testing/SRPMS/php-4.2.2-17.10.legacy.src.rpm
dd0daa7c3d6b4f491605e698c39cb451edff50ba 
fedora/1/updates-testing/i386/php-4.3.10-1.1.legacy.i386.rpm
c07635eca5d2ce4f1972c5faf3e14f4c00a19f2d 
fedora/1/updates-testing/i386/php-devel-4.3.10-1.1.legacy.i386.rpm
2658aabd4ebe409b0b9532baf0894abfe15c0f38 
fedora/1/updates-testing/i386/php-domxml-4.3.10-1.1.legacy.i386.rpm
b38d0ef81f4ccc1ef914bdeb4077461d4dba2d7b 
fedora/1/updates-testing/i386/php-imap-4.3.10-1.1.legacy.i386.rpm
e8d7d69f35641f915edba0eb9c5915db60e318d5 
fedora/1/updates-testing/i386/php-ldap-4.3.10-1.1.legacy.i386.rpm
f9a609b45b56e028080246ea7df8a53d1e0c33b7 
fedora/1/updates-testing/i386/php-mbstring-4.3.10-1.1.legacy.i386.rpm
f34d4ab35fc29149a8c8f84140940c9470356415 
fedora/1/updates-testing/i386/php-mysql-4.3.10-1.1.legacy.i386.rpm
71c362c35b2368348b56d8cd5f7c03812f7b7aa2 
fedora/1/updates-testing/i386/php-odbc-4.3.10-1.1.legacy.i386.rpm
de668bafb64e2f7cb8e3d1add11e8037159ce90d 
fedora/1/updates-testing/i386/php-pgsql-4.3.10-1.1.legacy.i386.rpm
d2bc37081e2633c0cbd721b24cbbeadffc0196be 
fedora/1/updates-testing/i386/php-snmp-4.3.10-1.1.legacy.i386.rpm
1538dab5f7b07a29191f459441478a4c9cc2c11e 
fedora/1/updates-testing/i386/php-xmlrpc-4.3.10-1.1.legacy.i386.rpm
125b673172ebeb9cf0bdefe5adc0060ae10d3c9d 
fedora/1/updates-testing/SRPMS/php-4.3.10-1.1.legacy.src.rpm

---------------------------------------------------------------------

Please test and comment in bugzilla.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 256 bytes
Desc: OpenPGP digital signature
URL: <http://listman.redhat.com/archives/fedora-legacy-list/attachments/20050228/404e988d/attachment.sig>


More information about the fedora-legacy-list mailing list