Uočeno je nekoliko sigurnosnih propusta u paketu PHP koje mogu iskoristiti udaljeni napadači kako bi otkrili povjerljive podatke o korisničkim lozinkama, pokrenuli proizvoljni programski kod ili izveli DoS napad.
Propusti su otkriveni u funkcijama "crypt_blowfish", "rfc1867_post_handler", "substr_replace", "socket_connect" i funkcijama koje primaju rezultate malloc, calloc i realloc funkcija. Neki od propusta se očituju kao preljev međuspremnika.
Posljedica:
Propuste mogu iskoristiti udaljeni napadači kako bi otkrili lozinke, stvarali i mijenjali proizvoljne podatke, pokrenuli proizvoljni programski kod ili izveli napad uskraćivanja usluge.
Rješenje:
Više informacija o propustima može se naći u izvornoj preporuci. Kako bi se zaštitili od opisanih napada, svim korisnicima se preporuča korištenje službenih programskih zakrpa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-11528
2011-08-26 18:28:28
--------------------------------------------------------------------------------
Name : php
Product : Fedora 15
Version : 5.3.8
Release : 1.fc15
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
Security Enhancements and Fixes:
* Updated crypt_blowfish to 1.2. (CVE-2011-2483)
* Fixed crash in error_log(). Reported by Mateusz Kocielski
* Fixed buffer overflow on overlog salt in crypt().
* Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload
filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)
* Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)
* Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)
Upstream announce for 5.3.8:
http://www.php.net/archive/2011.php#id2011-08-23-1
Upstream announce for 5.3.7:
http://www.php.net/archive/2011.php#id2011-08-18-1
Full Changelog: http://www.php.net/ChangeLog-5.php#5.3.8
--------------------------------------------------------------------------------
ChangeLog:
* Tue Aug 23 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-1
- update to 5.3.8
http://www.php.net/ChangeLog-5.php#5.3.8
* Thu Aug 18 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.7-1
- update to 5.3.7
http://www.php.net/ChangeLog-5.php#5.3.7
- enable mhash extension (emulated by hash extension)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #715025 - CVE-2011-2483 crypt_blowfish: 8-bit character mishandling
allows different password pairs to produce the same hash
https://bugzilla.redhat.com/show_bug.cgi?id=715025
[ 2 ] Bug #713194 - CVE-2011-2202 php: file path injection vulnerability in
RFC1867 file upload filename
https://bugzilla.redhat.com/show_bug.cgi?id=713194
[ 3 ] Bug #709067 - CVE-2011-1938 php: stack-based buffer overflow in
socket_connect()
https://bugzilla.redhat.com/show_bug.cgi?id=709067
[ 4 ] Bug #688958 - CVE-2011-1148 php: use-after-free vulnerability in
substr_replace()
https://bugzilla.redhat.com/show_bug.cgi?id=688958
[ 5 ] Bug #732516 - CVE-2011-3182 PHP multiple NULL pointer dereferences
https://bugzilla.redhat.com/show_bug.cgi?id=732516
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-11537
2011-08-26 18:28:52
--------------------------------------------------------------------------------
Name : php
Product : Fedora 14
Version : 5.3.8
Release : 1.fc14
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
Security Enhancements and Fixes:
* Updated crypt_blowfish to 1.2. (CVE-2011-2483)
* Fixed crash in error_log(). Reported by Mateusz Kocielski
* Fixed buffer overflow on overlog salt in crypt().
* Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload
filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)
* Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)
* Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)
Upstream announce for 5.3.8:
http://www.php.net/archive/2011.php#id2011-08-23-1
Upstream announce for 5.3.7:
http://www.php.net/archive/2011.php#id2011-08-18-1
Full Changelog: http://www.php.net/ChangeLog-5.php#5.3.8
--------------------------------------------------------------------------------
ChangeLog:
* Tue Aug 23 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-1
- update to 5.3.8
http://www.php.net/ChangeLog-5.php#5.3.8
* Thu Aug 18 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.7-1
- update to 5.3.7
http://www.php.net/ChangeLog-5.php#5.3.7
* Wed Mar 16 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.6-1
- update to 5.3.6
http://www.php.net/ChangeLog-5.php#5.3.6
* Fri Jan 7 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.5-1
- update to 5.3.5
http://www.php.net/ChangeLog-5.php#5.3.5
- clean duplicate configure options
- remove all RPM_SOURCE_DIR
- use mysql_config in libdir directly to avoid biarch build failures
* Sun Dec 12 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1.1
- security patch from upstream for #660517
* Sat Dec 11 2010 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.4-1
- update to 5.3.4
http://www.php.net/ChangeLog-5.php#5.3.4
- move phpize to php-cli (see #657812)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #732516 - CVE-2011-3182 PHP multiple NULL pointer dereferences
https://bugzilla.redhat.com/show_bug.cgi?id=732516
[ 2 ] Bug #715025 - CVE-2011-2483 crypt_blowfish: 8-bit character mishandling
allows different password pairs to produce the same hash
https://bugzilla.redhat.com/show_bug.cgi?id=715025
[ 3 ] Bug #713194 - CVE-2011-2202 php: file path injection vulnerability in
RFC1867 file upload filename
https://bugzilla.redhat.com/show_bug.cgi?id=713194
[ 4 ] Bug #709067 - CVE-2011-1938 php: stack-based buffer overflow in
socket_connect()
https://bugzilla.redhat.com/show_bug.cgi?id=709067
[ 5 ] Bug #688958 - CVE-2011-1148 php: use-after-free vulnerability in
substr_replace()
https://bugzilla.redhat.com/show_bug.cgi?id=688958
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke