New php packages are available for Slackware 10.2 and 11.0 to fix security issues.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
extra/php5/php-5.2.0-i486-1.tgz: Upgraded to php-5.2.0.
This release "includes a large number of new features, bug fixes and security
enhancements." In particular, when the UTF-8 charset is selected there are
buffer overflows in the htmlspecialchars() and htmlentities() that may be
exploited to execute arbitrary code.
More details about the vulnerability may be found here:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
Further details about the release can be found in the release announcement:
http://www.php.net/releases/5_2_0.php
Some syntax has changed since PHP 5.1.x. An upgrading guide may be found at
this location:
http://www.php.net/UPDATE_5_2.txt
This package was placed in /extra rather than /patches to save people from
possible surprises with automated upgrade tools, since users of PHP4 and
PHP 5.1.x applications may need to make some code changes before things will
work again.
(* Security fix *)
patches/packages/php-4.4.4-i486-4_slack11.0.tgz: Patched the UTF-8 overflow.
More details about the vulnerability may be found here:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/php-4.4.4-i486-2_slack10.2.tgz
Updated packages for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/php-4.4.4-i486-4_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/extra/php5/php-5.2.0-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 10.2 package:
2c7e99db93c5f4268ab510b72439ec6a php-4.4.4-i486-2_slack10.2.tgz
Slackware 11.0 packages:
9d42f4fd0cb8513ad34fae54be5a7450 php-4.4.4-i486-4_slack11.0.tgz
74a26ae3673b25a88cb7cd162bf37dfa php-5.2.0-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg php-4.4.4-i486-4_slack11.0.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
extra/php5/php-5.2.0-i486-1.tgz: Upgraded to php-5.2.0.
This release "includes a large number of new features, bug fixes and security
enhancements." In particular, when the UTF-8 charset is selected there are
buffer overflows in the htmlspecialchars() and htmlentities() that may be
exploited to execute arbitrary code.
More details about the vulnerability may be found here:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
Further details about the release can be found in the release announcement:
http://www.php.net/releases/5_2_0.php
Some syntax has changed since PHP 5.1.x. An upgrading guide may be found at
this location:
http://www.php.net/UPDATE_5_2.txt
This package was placed in /extra rather than /patches to save people from
possible surprises with automated upgrade tools, since users of PHP4 and
PHP 5.1.x applications may need to make some code changes before things will
work again.
(* Security fix *)
patches/packages/php-4.4.4-i486-4_slack11.0.tgz: Patched the UTF-8 overflow.
More details about the vulnerability may be found here:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/php-4.4.4-i486-2_slack10.2.tgz
Updated packages for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/php-4.4.4-i486-4_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/extra/php5/php-5.2.0-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 10.2 package:
2c7e99db93c5f4268ab510b72439ec6a php-4.4.4-i486-2_slack10.2.tgz
Slackware 11.0 packages:
9d42f4fd0cb8513ad34fae54be5a7450 php-4.4.4-i486-4_slack11.0.tgz
74a26ae3673b25a88cb7cd162bf37dfa php-5.2.0-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg php-4.4.4-i486-4_slack11.0.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com