U radu programskog paketa PHP, namijenjenog operacijskom sustavu Fedora 15, uočen je sigurnosni propust. Udaljenom napadaču omogućuje pokretanje proizvoljnog programskog koda.
Paket:
PHP 5.3.x
Operacijski sustavi:
Fedora 15
Kritičnost:
6.5
Problem:
pogreška u programskoj funkciji
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-0830
Izvorni ID preporuke:
FEDORA-2012-1301
Izvor:
Fedora
Problem:
Propust je uzrokovan pogreškom u funkciji "php_register_variable_ex" (php_variables.c), a posljedica je neodgovarajuće zakrpe za propust oznake CVE-2011-4885.
Posljedica:
Napadač ga može iskoristiti za izvršavanje proizvoljnog programskog koda.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-1301
2012-02-04 04:46:50
--------------------------------------------------------------------------------
Name : php
Product : Fedora 15
Version : 5.3.10
Release : 1.fc15
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
This update contains the latest release of PHP, 5.3.10, which fixes a security
issue.
A security fix introduced in PHP 5.3.9 allowed a remote user to crash the PHP
interpreter, or possibly, execute arbitrary code. (CVE-2012-0830)
--------------------------------------------------------------------------------
ChangeLog:
* Thu Feb 2 2012 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 5.3.10-1
- update to 5.3.10
* Wed Jan 11 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.9-1
- update to 5.3.9
http://www.php.net/ChangeLog-5.php#5.3.9
- fix owner of /var/log/php-fpm (bug #773077)
- add max_input_vars, max_file_uploads, zend.enable_gc to php.ini
- drop patch4, use --libdir to use /usr/lib*/php/build
* Wed Sep 28 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-3
- revert is_a() to php <= 5.3.6 behavior (from upstream)
with new option (allow_string) for new behavior
* Tue Aug 23 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-1
- update to 5.3.8
http://www.php.net/ChangeLog-5.php#5.3.8
* Thu Aug 18 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.7-1
- update to 5.3.7
http://www.php.net/ChangeLog-5.php#5.3.7
- enable mhash extension (emulated by hash extension)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #786686 - CVE-2012-0830 php: remote code exec flaw introduced in the
CVE-2011-4885 hashdos fix
https://bugzilla.redhat.com/show_bug.cgi?id=786686
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke