U radu programskog paketa PHP, za operacijske sustave Fedora 15, 16 i 17, otkriven je i ispravljen sigurnosni propust. Udaljenom napadaču omogućuje pokretanje proizvoljnog programskog koda.
Paket: | PHP 5.3.x |
Operacijski sustavi: | Fedora 15, Fedora 16, Fedora 17 |
Kritičnost: | 6.5 |
Problem: | pogreška u programskoj komponenti |
Iskorištavanje: | udaljeno |
Posljedica: | proizvoljno izvršavanje programskog koda |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-2311 |
Izvorni ID preporuke: | FEDORA-2012-7567 |
Izvor: | Fedora |
Problem: | |
Propust je uzrokovan pogreškom u datoteci "sapi/cgi/cgi_main.c" kada je konfigurirana kao CGI skripta, a posljedica je neodgovarajuće zakrpe za propust oznake CVE-2012-1823. |
|
Posljedica: | |
Napadači mogu iskoristiti nepravilnost za pokretanje proizvoljnog programskog koda. |
|
Rješenje: | |
Svim se korisnicima savjetuje instalacija odgovarajuće nadogradnje. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-7567
2012-05-10 03:38:46
--------------------------------------------------------------------------------
Name : php
Product : Fedora 15
Version : 5.3.13
Release : 1.fc15
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
The releases complete a fix for a vulnerability in CGI-based setups
(CVE-2012-2311).
--------------------------------------------------------------------------------
ChangeLog:
* Wed May 9 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.13-1
- update to 5.3.13 (CVE-2012-2311)
* Thu May 3 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.12
- update to 5.3.12 (CVE-2012-1823)
* Fri Apr 27 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.11-1
- update to 5.3.11
http://www.php.net/ChangeLog-5.php#5.3.11
- add /etc/sysconfig/php-fpm environment file (#784770)
- php-fpm: add security.limit_extensions in provided conf
* Thu Feb 2 2012 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 5.3.10-1
- update to 5.3.10
* Wed Jan 11 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.9-1
- update to 5.3.9
http://www.php.net/ChangeLog-5.php#5.3.9
- fix owner of /var/log/php-fpm (bug #773077)
- add max_input_vars, max_file_uploads, zend.enable_gc to php.ini
- drop patch4, use --libdir to use /usr/lib*/php/build
* Wed Sep 28 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-3
- revert is_a() to php <= 5.3.6 behavior (from upstream)
with new option (allow_string) for new behavior
* Tue Aug 23 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.8-1
- update to 5.3.8
http://www.php.net/ChangeLog-5.php#5.3.8
* Thu Aug 18 2011 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.7-1
- update to 5.3.7
http://www.php.net/ChangeLog-5.php#5.3.7
- enable mhash extension (emulated by hash extension)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #818607 - CVE-2012-1823 php: command line arguments injection when
run in CGI mode (VU#520827)
https://bugzilla.redhat.com/show_bug.cgi?id=818607
[ 2 ] Bug #818907 - CVE-2012-2311 php: incomplete CVE-2012-1823 fix -
incorrect check for =
https://bugzilla.redhat.com/show_bug.cgi?id=818907
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-7586
2012-05-10 03:43:29
--------------------------------------------------------------------------------
Name : php
Product : Fedora 16
Version : 5.3.13
Release : 1.fc16
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
The releases complete a fix for a vulnerability in CGI-based setups
(CVE-2012-2311).
--------------------------------------------------------------------------------
ChangeLog:
* Wed May 9 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.13-1
- update to 5.3.13 (CVE-2012-2311)
* Thu May 3 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.12
- update to 5.3.12 (CVE-2012-1823)
* Fri Apr 27 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.11-1
- update to 5.3.11
http://www.php.net/ChangeLog-5.php#5.3.11
- add /etc/sysconfig/php-fpm environment file (#784770)
- php-fpm: add security.limit_extensions in provided conf
- zip extension is back (unbundled in f17)
* Thu Feb 2 2012 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 5.3.10-1
- update to 5.3.10
* Wed Jan 11 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.3.9-1
- update to 5.3.9
http://www.php.net/ChangeLog-5.php#5.3.9
- fix owner of /var/log/php-fpm (bug #773077)
- add max_input_vars, max_file_uploads, zend.enable_gc to php.ini
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #818607 - CVE-2012-1823 php: command line arguments injection when
run in CGI mode (VU#520827)
https://bugzilla.redhat.com/show_bug.cgi?id=818607
[ 2 ] Bug #818907 - CVE-2012-2311 php: incomplete CVE-2012-1823 fix -
incorrect check for =
https://bugzilla.redhat.com/show_bug.cgi?id=818907
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-7628
2012-05-10 20:33:47
--------------------------------------------------------------------------------
Name : php
Product : Fedora 17
Version : 5.4.3
Release : 1.fc17
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module which adds support for the PHP
language to Apache HTTP Server.
--------------------------------------------------------------------------------
Update Information:
The releases complete a fix for a vulnerability in CGI-based setups
(CVE-2012-2311).
PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers()
(CVE-2012-2329).
--------------------------------------------------------------------------------
ChangeLog:
* Wed May 9 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.4.3-1
- update to 5.4.3 (CVE-2012-2311, CVE-2012-2329)
* Thu May 3 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 5.4.2-1
- update to 5.4.2 (CVE-2012-1823)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #818607 - CVE-2012-1823 php: command line arguments injection when
run in CGI mode (VU#520827)
https://bugzilla.redhat.com/show_bug.cgi?id=818607
[ 2 ] Bug #818907 - CVE-2012-2311 php: incomplete CVE-2012-1823 fix -
incorrect check for =
https://bugzilla.redhat.com/show_bug.cgi?id=818907
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke