[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 9 Update: php-5.2.6-2.fc9



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-3606
2008-06-20 16:47:35
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 9
Version     : 5.2.6
Release     : 2.fc9
URL         : http://www.php.net/
Summary     : The PHP HTML-embedded scripting language
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

This release updates PHP to the latest upstream version 5.2.6, fixing multiple
bugs and security issues.    See upstream release notes for further details:
http://www.php.net/releases/5_2_6.php    It was discovered that the PHP
escapeshellcmd() function did not properly escape multi-byte characters which
are not valid in the locale used by the script. This could allow an attacker to
bypass quoting restrictions imposed by escapeshellcmd() and execute arbitrary
commands if the PHP script was using certain locales. Scripts using the default
UTF-8 locale are not affected by this issue. (CVE-2008-2051)    It was
discovered that a PHP script using the transparent session ID configuration
option, or using the output_add_rewrite_var() function, could leak session
identifiers to external web sites. If a page included an HTML form which is
posted to a third-party web site, the user's session ID would be included in the
form data and passed to that web site. (CVE-2007-5899)    It was discovered that
PHP did not properly seed its pseudo-random number generator used by functions
such as rand() and mt_rand(), possibly allowing an attacker to easily predict
the generated pseudo-random values. (CVE-2008-2107, CVE-2008-2108)
--------------------------------------------------------------------------------
ChangeLog:

* Thu May  8 2008 Joe Orton <jorton redhat com> 5.2.6-2
- update to 5.2.6
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #445006 - CVE-2008-2051 PHP multibyte shell escape flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=445006
  [ 2 ] Bug #445685 - CVE-2008-2108 PHP weak 64 bit random seed
        https://bugzilla.redhat.com/show_bug.cgi?id=445685
  [ 3 ] Bug #445684 - CVE-2008-2107 PHP 32 bit weak random seed
        https://bugzilla.redhat.com/show_bug.cgi?id=445684
  [ 4 ] Bug #445003 - CVE-2008-0599 php: buffer overflow in a CGI path translation
        https://bugzilla.redhat.com/show_bug.cgi?id=445003
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]