|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] php5 in Slackware 10.1 (SSA:2005-251-04)
Date: Thu, 8 Sep 2005 15:55:19 -0700 (PDT) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] php5 in Slackware 10.1 (SSA:2005-251-04)
A new php5 package is available for Slackware 10.1 in /testing to fix
security issues. PHP has been relinked with the shared PCRE library
to fix an overflow issue with PHP's builtin PRCE code, and
PEAR::XMLRPC has been upgraded to version 1.4.0 which eliminates the
eval() function. The eval() function is believed to be insecure as
implemented, and would be difficult to secure.
Note that this new package now requires that the PCRE package be
installed, so be sure to get the new package from the patches/packages/
directory if you don't already have it.
More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498
Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
testing/packages/php-5.0.5/php-5.0.5-i486-1.tgz: Upgraded to
php-5.0.5, which fixes security issues with XML-RPC and PCRE.
This new package now links with the system's shared PCRE library,
so be sure you have the new PCRE package from patches/packages/
installed.
Ordinarily packages in /testing are not considered supported, but
several people have written to say that they are using php5 from
/testing in a production environment and would like to see an
updated package, so here it is. The package in /testing was
replaced in /testing rather than putting it under /patches to
avoid any problems with automatic upgrade tools replacing php-4
packages with this one.
For more information on the security issues fixed, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498
(* Security fix *)
+--------------------------+
Where to find the new package:
+----------------------------+
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/testing/packages/php-5.0.5/php-5.0.5-i486-1.tgz
MD5 signature:
+------------+
Slackware 10.1 package:
8926968bdfa8bd2103048bd2c21ad07c php-5.0.5-i486-1.tgz
Installation instructions:
+------------------------+
First, stop apache:
# apachectl stop
Next, upgrade to the new PHP package:
# upgradepkg php-5.0.5-i486-1.tgz
Finally, restart apache:
# apachectl start (or: apachectl startssl)
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)
iD8DBQFDILD8akRjwEAQIjMRApwaAJ9hMngW4TzkdGpR8Lf0v8BOhYNstwCeP8en
b833Twq3uC7HDiF0ozD0u9U=
=VN+L
-----END PGP SIGNATURE-----
|
| |