A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: php security update
Advisory ID: RHSA-2006:0567-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0567.html
Issue date: 2006-07-25
Updated on: 2006-07-25
Product: Red Hat Enterprise Linux
CVE Names: CVE-2002-2214 CVE-2006-1494 CVE-2006-3017
- ---------------------------------------------------------------------
1. Summary:
Updated PHP packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 2.1
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
A flaw was found in the zend_hash_del() PHP function. For PHP scripts that
rely on the use of the unset() function, a remote attacker could force
variable initialization to be bypassed. This would be a security issue
particularly for installations that enable the "register_globals" setting.
"register_globals" is disabled by default in Red Hat Enterprise Linux.
(CVE-2006-3017)
A directory traversal vulnerability was found in PHP. Local users could
bypass open_basedir restrictions allowing remote attackers to create files
in arbitrary directories via the tempnam() function. (CVE-2006-1494)
A flaw was found in the PHP IMAP MIME header decoding function. An
attacker could craft a message with an overly long header which caused
PHP to crash. (CVE-2002-2214)
Users of PHP should upgrade to these updated packages, which contain
backported patches that resolve these issues.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
195495 - CVE-2002-2214 php imap To header buffer overflow
196257 - CVE-2006-3017 zend_hash_del bug
197050 - CVE-2006-1494 PHP tempname open_basedir issue
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/php-4.1.2-2.8.src.rpm
b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm
i386:
49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm
fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm
a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm
2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm
296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm
a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm
7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm
bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm
ia64:
0de57ca1d1f8ad29f509288a9c67f501 php-4.1.2-2.8.ia64.rpm
b386f3eacea485b36525055006fa89c5 php-devel-4.1.2-2.8.ia64.rpm
91b7f7262828ad5c9f17d8e1e02bd9e1 php-imap-4.1.2-2.8.ia64.rpm
bb5d71d5964ed4e3ebaba5c1e755599c php-ldap-4.1.2-2.8.ia64.rpm
2d1d721016880e26c041d36af289288f php-manual-4.1.2-2.8.ia64.rpm
74de741c6420b49591eb82e8d3109286 php-mysql-4.1.2-2.8.ia64.rpm
ac98627c368011e8bc123fab619131fa php-odbc-4.1.2-2.8.ia64.rpm
101f908d73b7182821a6ca553df4c3f5 php-pgsql-4.1.2-2.8.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/php-4.1.2-2.8.src.rpm
b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm
ia64:
0de57ca1d1f8ad29f509288a9c67f501 php-4.1.2-2.8.ia64.rpm
b386f3eacea485b36525055006fa89c5 php-devel-4.1.2-2.8.ia64.rpm
91b7f7262828ad5c9f17d8e1e02bd9e1 php-imap-4.1.2-2.8.ia64.rpm
bb5d71d5964ed4e3ebaba5c1e755599c php-ldap-4.1.2-2.8.ia64.rpm
2d1d721016880e26c041d36af289288f php-manual-4.1.2-2.8.ia64.rpm
74de741c6420b49591eb82e8d3109286 php-mysql-4.1.2-2.8.ia64.rpm
ac98627c368011e8bc123fab619131fa php-odbc-4.1.2-2.8.ia64.rpm
101f908d73b7182821a6ca553df4c3f5 php-pgsql-4.1.2-2.8.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/php-4.1.2-2.8.src.rpm
b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm
i386:
49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm
fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm
a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm
2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm
296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm
a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm
7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm
bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/php-4.1.2-2.8.src.rpm
b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm
i386:
49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm
fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm
a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm
2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm
296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm
a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm
7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm
bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3017
http://www.php.net/register_globals
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFExg2lXlSAg2UNWIIRAlBqAKCasxXredz0b35TY/KcKofrlFYTlgCdHeA5
sh05mr/MHMArqz1zE6X3Fkk=
=oEw2
-----END PGP SIGNATURE-----