Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] php5 in Slackware 10.1 (SSA:2005-251-04)
Date: Thu, 8 Sep 2005 15:55:19 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  php5 in Slackware 10.1 (SSA:2005-251-04)

A new php5 package is available for Slackware 10.1 in /testing to fix
security issues.  PHP has been relinked with the shared PCRE library
to fix an overflow issue with PHP's builtin PRCE code, and
PEAR::XMLRPC has been upgraded to version 1.4.0 which eliminates the
eval() function.  The eval() function is believed to be insecure as
implemented, and would be difficult to secure.

Note that this new package now requires that the PCRE package be
installed, so be sure to get the new package from the patches/packages/
directory if you don't already have it.

More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498

Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
testing/packages/php-5.0.5/php-5.0.5-i486-1.tgz:  Upgraded to
  php-5.0.5, which fixes security issues with XML-RPC and PCRE.
  This new package now links with the system's shared PCRE library,
  so be sure you have the new PCRE package from patches/packages/
  installed.
  Ordinarily packages in /testing are not considered supported, but
  several people have written to say that they are using php5 from
  /testing in a production environment and would like to see an
  updated package, so here it is.  The package in /testing was
  replaced in /testing rather than putting it under /patches to
  avoid any problems with automatic upgrade tools replacing php-4
  packages with this one.
  For more information on the security issues fixed, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498
  (* Security fix *)
+--------------------------+


Where to find the new package:
+----------------------------+

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/testing/packages/php-5.0.5/php-5.0.5-i486-1.tgz


MD5 signature:
+------------+

Slackware 10.1 package:
8926968bdfa8bd2103048bd2c21ad07c  php-5.0.5-i486-1.tgz


Installation instructions:
+------------------------+

First, stop apache:
# apachectl stop

Next, upgrade to the new PHP package:
# upgradepkg php-5.0.5-i486-1.tgz

Finally, restart apache:
# apachectl start  (or: apachectl startssl)


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFDILD8akRjwEAQIjMRApwaAJ9hMngW4TzkdGpR8Lf0v8BOhYNstwCeP8en
b833Twq3uC7HDiF0ozD0u9U=
=VN+L
-----END PGP SIGNATURE-----

Slackware™ is a trademark of Patrick Volkerding.