Uočeni su višestruki sigurnosni nedostaci u radu programskog paketa PHP, namijenjenog operacijskim sustavima Fedora 13 i 14. Riječ je o skriptnom programskom jeziku koji se koristi za razvoj dinamičkih web stranica. Neki od propusta su vezani uz "open_basedir", neodgovarajuću obradu ulaznih podataka u datoteci "ext/xml/xml.c" te pogreške u funkcijama "filter_var()" i "ZipArchive::getArchiveComment". Napadaču omogućuju pokretanje proizvoljnog programskog koda, izvođenje DoS i XSS napada, zaobilaženje postavljenih sigurnosnih ograničenja te otkrivanje podataka. Za više detalja o svim propustima savjetuje se pregled izvornog upozorenja. Korisnike se potiče na nadogradnju.

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-19011
2010-12-17 07:53:09
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 13
Version     : 5.3.4
Release     : 1.fc13.1
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

Security Enhancements and Fixes in PHP 5.3.4:

* Fixed crash in zip extract method (possible CWE-170).
* Paths with NULL in them (foo bar.txt) are now considered as invalid
(CVE-2006-7243).
* Fixed a possible double free in imap extension (Identified by Mateusz
Kocielski). (CVE-2010-4150).
* Fixed NULL pointer dereference in ZipArchive::getArchiveComment.
(CVE-2010-3709).
* Fixed possible flaw in open_basedir (CVE-2010-3436).
* Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950).
* Fixed symbolic resolution support when the target is a DFS share.
* Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with
large amount of data) (CVE-2010-3710).

Key Bug Fixes in PHP 5.3.4 include:

* Added stat support for zip stream.
* Added follow_location (enabled by default) option for the http stream
support.
* Added a 3rd parameter to get_html_translation_table. It now takes a charset
hint, like htmlentities et al.
* Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend
multibyte at runtime.

Full upstream Changelog : http://www.php.net/ChangeLog-5.php#5.3.4

This update also provides php-eaccelerator and maniadrive packages rebuild
against update php.
--------------------------------------------------------------------------------
ChangeLog:

* Sun Dec 12 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1.1
- security patch from upstream for #660517
* Sat Dec 11 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1
- update to 5.3.4
  http://www.php.net/ChangeLog-5.php#5.3.4
- move phpize to php-cli (see #657812)
* Thu Jul 22 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.3-1
- PHP 5.3.3 released
* Fri Apr 30 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.2-3
- garbage collector upstream  patches (#580236)
* Fri Apr  2 2010 CaolÃ¥n McNamara <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.2-2
- rebuild for icu 4.4
* Sat Mar  6 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.2-1
- PHP 5.3.2 Released!
- remove mime_magic option (now provided by fileinfo, by emu)
- add patch for http://bugs.php.net/50578
- remove patch for libedit (upstream)
- add runselftest option to allow build without test suite
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #649056 - CVE-2010-3870 php: XSS mitigation bypass via
utf8_decode()
        https://bugzilla.redhat.com/show_bug.cgi?id=649056
  [ 2 ] Bug #651206 - CVE-2010-3709 php: NULL pointer dereference in
ZipArchive::getArchiveComment
        https://bugzilla.redhat.com/show_bug.cgi?id=651206
  [ 3 ] Bug #651682 - CVE-2010-4156 php information disclosure via mb_strcut()
        https://bugzilla.redhat.com/show_bug.cgi?id=651682
  [ 4 ] Bug #652836 - CVE-2009-5016 php: XSS and SQL injection bypass via
crafted overlong UTF-8 encoded string
        https://bugzilla.redhat.com/show_bug.cgi?id=652836
  [ 5 ] Bug #660382 - CVE-2010-4409 php: getSymbol() integer overflow
vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=660382
  [ 6 ] Bug #656917 - CVE-2010-4150 php: Double free in the imap extension
        https://bugzilla.redhat.com/show_bug.cgi?id=656917
  [ 7 ] Bug #646684 - CVE-2010-3710 php: DoS in filter_var() via long email
string
        https://bugzilla.redhat.com/show_bug.cgi?id=646684
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-18976
2010-12-17 07:51:56
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 14
Version     : 5.3.4
Release     : 1.fc14.1
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

Security Enhancements and Fixes in PHP 5.3.4:

* Fixed crash in zip extract method (possible CWE-170).
* Paths with NULL in them (foo&#65533;bar.txt) are now considered as invalid
(CVE-2006-7243).
* Fixed a possible double free in imap extension (Identified by Mateusz
Kocielski). (CVE-2010-4150).
* Fixed NULL pointer dereference in ZipArchive::getArchiveComment.
(CVE-2010-3709).
* Fixed possible flaw in open_basedir (CVE-2010-3436).
* Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950).
* Fixed symbolic resolution support when the target is a DFS share.
* Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with
large amount of data) (CVE-2010-3710).

Key Bug Fixes in PHP 5.3.4 include:

* Added stat support for zip stream.
* Added follow_location (enabled by default) option for the http stream
support.
* Added a 3rd parameter to get_html_translation_table. It now takes a charset
hint, like htmlentities et al.
* Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend
multibyte at runtime.

Full upstream Changelog : http://www.php.net/ChangeLog-5.php#5.3.4

This update also provides php-eaccelerator and maniadrive packages rebuild
against update php.
--------------------------------------------------------------------------------
ChangeLog:

* Sun Dec 12 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1.1
- security patch from upstream for #660517
* Sat Dec 11 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1
- update to 5.3.4
  http://www.php.net/ChangeLog-5.php#5.3.4
- move phpize to php-cli (see #657812)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #649056 - CVE-2010-3870 php: XSS mitigation bypass via
utf8_decode()
        https://bugzilla.redhat.com/show_bug.cgi?id=649056
  [ 2 ] Bug #651206 - CVE-2010-3709 php: NULL pointer dereference in
ZipArchive::getArchiveComment
        https://bugzilla.redhat.com/show_bug.cgi?id=651206
  [ 3 ] Bug #651682 - CVE-2010-4156 php information disclosure via mb_strcut()
        https://bugzilla.redhat.com/show_bug.cgi?id=651682
  [ 4 ] Bug #652836 - CVE-2009-5016 php: XSS and SQL injection bypass via
crafted overlong UTF-8 encoded string
        https://bugzilla.redhat.com/show_bug.cgi?id=652836
  [ 5 ] Bug #660382 - CVE-2010-4409 php: getSymbol() integer overflow
vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=660382
  [ 6 ] Bug #656917 - CVE-2010-4150 php: Double free in the imap extension
        https://bugzilla.redhat.com/show_bug.cgi?id=656917
  [ 7 ] Bug #646684 - CVE-2010-3710 php: DoS in filter_var() via long email
string
        https://bugzilla.redhat.com/show_bug.cgi?id=646684
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Idi na vrh