[SECURITY] Fedora 9 Update: php-5.2.9-2.fc9

updates at fedoraproject.org updates at fedoraproject.org
Sat May 30 02:38:47 UTC 2009


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-3848
2009-04-21 23:56:05
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 9
Version     : 5.2.9
Release     : 2.fc9
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

Update to PHP 5.2.9    A heap-based buffer overflow flaw was found in PHP's
mbstring extension. A remote attacker able to pass arbitrary input to a PHP
script using mbstring conversion functions could cause the PHP interpreter to
crash or, possibly, execute arbitrary code. (CVE-2008-5557)    A directory
traversal flaw was found in PHP's ZipArchive::extractTo function. If PHP is used
to extract a malicious ZIP archive, it could allow an attacker to write
arbitrary files anywhere the PHP process has write permissions. (CVE-2008-5658)
A buffer overflow flaw was found in PHP's imageloadfont function. If a PHP
script allowed a remote attacker to load a carefully crafted font file, it could
cause the PHP interpreter to crash or, possibly, execute arbitrary code.
(CVE-2008-3658)    A memory disclosure flaw was found in the PHP gd extension's
imagerotate function. A remote attacker able to pass arbitrary values as the
"background color" argument of the function could, possibly, view portions of
the PHP interpreter's memory. (CVE-2008-5498)    A cross-site scripting flaw was
found in a way PHP reported errors for invalid cookies. If the PHP interpreter
had "display_errors" enabled, a remote attacker able to set a specially-crafted
cookie on a victim's system could possibly inject arbitrary HTML into an error
message generated by PHP. (CVE-2008-5814)    A flaw was found in the handling of
the "mbstring.func_overload" configuration setting. A value set for one virtual
host, or in a user's .htaccess file, was incorrectly applied to other virtual
hosts on the same server, causing the handling of multibyte character strings to
not work correctly. (CVE-2009-0754)    A flaw was found in PHP's json_decode
function. A remote attacker could use this flaw to create a specially-crafted
string which could cause the PHP interpreter to crash while being decoded in a
PHP script. (CVE-2009-1271)    A flaw was found in the use of the uw-imap
library by the PHP "imap" extension. This could cause the PHP interpreter to
crash if the "imap" extension was used to read specially-crafted mail messages
with long headers. (CVE-2008-2829)    http://www.php.net/releases/5_2_7.php
http://www.php.net/releases/5_2_8.php  http://www.php.net/releases/5_2_9.php
http://www.php.net/ChangeLog-5.php#5.2.9
--------------------------------------------------------------------------------
ChangeLog:

* Fri Apr 17 2009 Joe Orton <jorton at redhat.com> 5.2.9-2
- stay at v3 of systzdata patch
* Thu Apr 16 2009 Remi Collet <Fedora at FamilleCollet.com> - 5.2.9-1
- update to 5.2.9
- merge with some rawhide improvments (fix patch fuzz, renumber
  patches, drop obsolete configure args, drop -odbc patch)
* Sat Jan  3 2009 Remi Collet <Fedora at FamilleCollet.com> 5.2.8-1
- update to 5.2.8
- add missing php_embed.h (#457777)
- enable pdo_dblib driver in php-mssql
* Tue Nov  4 2008 Joe Orton <jorton at redhat.com> 5.2.6-6
- move gd_README to php-gd
- update to r4 of systzdata patch; introduces a default timezone
  name of "System/Localtime", which uses /etc/localtime (#469532)
* Sat Sep 13 2008 Remi Collet <Fedora at FamilleCollet.com> 5.2.6-5
- enable XPM support in php-gd
- Fix BR for php-gd
* Sun Jul 20 2008 Remi Collet <Fedora at FamilleCollet.com> 5.2.6-4
- enable T1lib support in php-gd
* Mon Jul 14 2008 Joe Orton <jorton at redhat.com> 5.2.6-3
- update to 5.2.6
- sync default php.ini with upstream
- drop extension_dir from default php.ini, rely on hard-coded
  default, to make php-common multilib-safe (#455091)
- update to r3 of systzdata patch
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #478425 - CVE-2008-5498 php: libgd imagerotate() array index error memory disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=478425
  [ 2 ] Bug #494530 - CVE-2009-1271 php: crash on malformed input in json_decode()
        https://bugzilla.redhat.com/show_bug.cgi?id=494530
  [ 3 ] Bug #459529 - CVE-2008-3658 php: buffer overflow in the imageloadfont function in gd extension
        https://bugzilla.redhat.com/show_bug.cgi?id=459529
  [ 4 ] Bug #459572 - CVE-2008-3660 php: FastCGI module DoS via multiple dots preceding the extension
        https://bugzilla.redhat.com/show_bug.cgi?id=459572
  [ 5 ] Bug #452808 - CVE-2008-2829 php: ext/imap legacy routine buffer overflow
        https://bugzilla.redhat.com/show_bug.cgi?id=452808
  [ 6 ] Bug #474824 - CVE-2008-5658 php: ZipArchive::extractTo() Directory Traversal Vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=474824
  [ 7 ] Bug #478848 - CVE-2008-5557 php: Heap-based buffer overflow in the mbstring extension via crafted string containing a HTML entity (arb code execution)
        https://bugzilla.redhat.com/show_bug.cgi?id=478848
  [ 8 ] Bug #479272 - CVE-2009-0754 PHP mbstring.func_overload web server denial of service
        https://bugzilla.redhat.com/show_bug.cgi?id=479272
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the package-announce mailing list