Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: <updates <at> fedoraproject.org>
Subject: [SECURITY] Fedora 9 Update: php-5.2.9-2.fc9
Newsgroups: gmane.linux.redhat.fedora.package.announce
Date: Saturday 30th May 2009 02:38:47 UTC (over 7 years ago)
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-3848
2009-04-21 23:56:05
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 9
Version     : 5.2.9
Release     : 2.fc9
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

Update to PHP 5.2.9    A heap-based buffer overflow flaw was found in PHP's
mbstring extension. A remote attacker able to pass arbitrary input to a PHP
script using mbstring conversion functions could cause the PHP interpreter
to
crash or, possibly, execute arbitrary code. (CVE-2008-5557)    A directory
traversal flaw was found in PHP's ZipArchive::extractTo function. If PHP is
used
to extract a malicious ZIP archive, it could allow an attacker to write
arbitrary files anywhere the PHP process has write permissions.
(CVE-2008-5658)
A buffer overflow flaw was found in PHP's imageloadfont function. If a PHP
script allowed a remote attacker to load a carefully crafted font file, it
could
cause the PHP interpreter to crash or, possibly, execute arbitrary code.
(CVE-2008-3658)    A memory disclosure flaw was found in the PHP gd
extension's
imagerotate function. A remote attacker able to pass arbitrary values as
the
"background color" argument of the function could, possibly, view portions
of
the PHP interpreter's memory. (CVE-2008-5498)    A cross-site scripting
flaw was
found in a way PHP reported errors for invalid cookies. If the PHP
interpreter
had "display_errors" enabled, a remote attacker able to set a
specially-crafted
cookie on a victim's system could possibly inject arbitrary HTML into an
error
message generated by PHP. (CVE-2008-5814)    A flaw was found in the
handling of
the "mbstring.func_overload" configuration setting. A value set for one
virtual
host, or in a user's .htaccess file, was incorrectly applied to other
virtual
hosts on the same server, causing the handling of multibyte character
strings to
not work correctly. (CVE-2009-0754)    A flaw was found in PHP's
json_decode
function. A remote attacker could use this flaw to create a
specially-crafted
string which could cause the PHP interpreter to crash while being decoded
in a
PHP script. (CVE-2009-1271)    A flaw was found in the use of the uw-imap
library by the PHP "imap" extension. This could cause the PHP interpreter
to
crash if the "imap" extension was used to read specially-crafted mail
messages
with long headers. (CVE-2008-2829)    http://www.php.net/releases/5_2_7.php
http://www.php.net/releases/5_2_8.php
 http://www.php.net/releases/5_2_9.php
http://www.php.net/ChangeLog-5.php#5.2.9
--------------------------------------------------------------------------------
ChangeLog:

* Fri Apr 17 2009 Joe Orton <[email protected]> 5.2.9-2
- stay at v3 of systzdata patch
* Thu Apr 16 2009 Remi Collet  - 5.2.9-1
- update to 5.2.9
- merge with some rawhide improvments (fix patch fuzz, renumber
  patches, drop obsolete configure args, drop -odbc patch)
* Sat Jan  3 2009 Remi Collet  5.2.8-1
- update to 5.2.8
- add missing php_embed.h (#457777)
- enable pdo_dblib driver in php-mssql
* Tue Nov  4 2008 Joe Orton <[email protected]> 5.2.6-6
- move gd_README to php-gd
- update to r4 of systzdata patch; introduces a default timezone
  name of "System/Localtime", which uses /etc/localtime (#469532)
* Sat Sep 13 2008 Remi Collet  5.2.6-5
- enable XPM support in php-gd
- Fix BR for php-gd
* Sun Jul 20 2008 Remi Collet  5.2.6-4
- enable T1lib support in php-gd
* Mon Jul 14 2008 Joe Orton <[email protected]> 5.2.6-3
- update to 5.2.6
- sync default php.ini with upstream
- drop extension_dir from default php.ini, rely on hard-coded
  default, to make php-common multilib-safe (#455091)
- update to r3 of systzdata patch
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #478425 - CVE-2008-5498 php: libgd imagerotate() array index
error memory disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=478425
  [ 2 ] Bug #494530 - CVE-2009-1271 php: crash on malformed input in
json_decode()
        https://bugzilla.redhat.com/show_bug.cgi?id=494530
  [ 3 ] Bug #459529 - CVE-2008-3658 php: buffer overflow in the
imageloadfont function in gd extension
        https://bugzilla.redhat.com/show_bug.cgi?id=459529
  [ 4 ] Bug #459572 - CVE-2008-3660 php: FastCGI module DoS via multiple
dots preceding the extension
        https://bugzilla.redhat.com/show_bug.cgi?id=459572
  [ 5 ] Bug #452808 - CVE-2008-2829 php: ext/imap legacy routine buffer
overflow
        https://bugzilla.redhat.com/show_bug.cgi?id=452808
  [ 6 ] Bug #474824 - CVE-2008-5658 php: ZipArchive::extractTo() Directory
Traversal Vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=474824
  [ 7 ] Bug #478848 - CVE-2008-5557 php: Heap-based buffer overflow in the
mbstring extension via crafted string containing a HTML entity (arb code
execution)
        https://bugzilla.redhat.com/show_bug.cgi?id=478848
  [ 8 ] Bug #479272 - CVE-2009-0754 PHP mbstring.func_overload web server
denial of service
        https://bugzilla.redhat.com/show_bug.cgi?id=479272
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on
the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------
 
CD: 2ms