User: Password:
|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2010-19011 (php)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 13 Update: php-5.3.4-1.fc13.1
Date:  Tue, 04 Jan 2011 20:53:11 +0000
Message-ID:  <20110104205311.E1A0E1110CE@bastion02.phx2.fedoraproject.org>
Archive-link:  Article, Thread

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2010-19011 2010-12-17 07:53:09 -------------------------------------------------------------------------------- Name : php Product : Fedora 13 Version : 5.3.4 Release : 1.fc13.1 URL : http://www.php.net/ Summary : PHP scripting language for creating dynamic web sites Description : PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module which adds support for the PHP language to Apache HTTP Server. -------------------------------------------------------------------------------- Update Information: Security Enhancements and Fixes in PHP 5.3.4: * Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710). Key Bug Fixes in PHP 5.3.4 include: * Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime. Full upstream Changelog : http://www.php.net/ChangeLog-5.php#5.3.4 This update also provides php-eaccelerator and maniadrive packages rebuild against update php. -------------------------------------------------------------------------------- ChangeLog: * Sun Dec 12 2010 Remi Collet <rpms@famillecollet.com> 5.3.4-1.1 - security patch from upstream for #660517 * Sat Dec 11 2010 Remi Collet <Fedora@famillecollet.com> 5.3.4-1 - update to 5.3.4 http://www.php.net/ChangeLog-5.php#5.3.4 - move phpize to php-cli (see #657812) * Thu Jul 22 2010 Remi Collet <Fedora@famillecollet.com> 5.3.3-1 - PHP 5.3.3 released * Fri Apr 30 2010 Remi Collet <Fedora@famillecollet.com> 5.3.2-3 - garbage collector upstream patches (#580236) * Fri Apr 2 2010 Caolán McNamara <caolanm@redhat.com> 5.3.2-2 - rebuild for icu 4.4 * Sat Mar 6 2010 Remi Collet <Fedora@famillecollet.com> 5.3.2-1 - PHP 5.3.2 Released! - remove mime_magic option (now provided by fileinfo, by emu) - add patch for http://bugs.php.net/50578 - remove patch for libedit (upstream) - add runselftest option to allow build without test suite -------------------------------------------------------------------------------- References: [ 1 ] Bug #649056 - CVE-2010-3870 php: XSS mitigation bypass via utf8_decode() https://bugzilla.redhat.com/show_bug.cgi?id=649056 [ 2 ] Bug #651206 - CVE-2010-3709 php: NULL pointer dereference in ZipArchive::getArchiveComment https://bugzilla.redhat.com/show_bug.cgi?id=651206 [ 3 ] Bug #651682 - CVE-2010-4156 php information disclosure via mb_strcut() https://bugzilla.redhat.com/show_bug.cgi?id=651682 [ 4 ] Bug #652836 - CVE-2009-5016 php: XSS and SQL injection bypass via crafted overlong UTF-8 encoded string https://bugzilla.redhat.com/show_bug.cgi?id=652836 [ 5 ] Bug #660382 - CVE-2010-4409 php: getSymbol() integer overflow vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=660382 [ 6 ] Bug #656917 - CVE-2010-4150 php: Double free in the imap extension https://bugzilla.redhat.com/show_bug.cgi?id=656917 [ 7 ] Bug #646684 - CVE-2010-3710 php: DoS in filter_var() via long email string https://bugzilla.redhat.com/show_bug.cgi?id=646684 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update php' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds