Skip to navigation

Security Advisory php security update

Advisory: RHSA-2006:0567-7
Type: Security Advisory
Severity: Moderate
Issued on: 2006-07-25
Last updated on: 2006-07-25
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2002-2214
CVE-2006-1494
CVE-2006-3017

Details

Updated PHP packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 2.1

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

A flaw was found in the zend_hash_del() PHP function. For PHP scripts that
rely on the use of the unset() function, a remote attacker could force
variable initialization to be bypassed. This would be a security issue
particularly for installations that enable the "register_globals" setting.
"register_globals" is disabled by default in Red Hat Enterprise Linux.
(CVE-2006-3017)

A directory traversal vulnerability was found in PHP. Local users could
bypass open_basedir restrictions allowing remote attackers to create files
in arbitrary directories via the tempnam() function. (CVE-2006-1494)

A flaw was found in the PHP IMAP MIME header decoding function. An
attacker could craft a message with an overly long header which caused
PHP to crash. (CVE-2002-2214)

Users of PHP should upgrade to these updated packages, which contain
backported patches that resolve these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
php-4.1.2-2.8.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: b00da9890a6407ceeefde6af712335a8
 
IA-32:
php-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 49c5170d0254ab6852ed1a0ec99ee005
php-devel-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: fbbf8ecb1d8212fb61ab03cb582fa6ba
php-imap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a8cc27adc804ac40f5530f5bc305209b
php-ldap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2b9e509db230478986a620bccf3c3595
php-manual-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 296c22cd73b830fc0455a3cc00b38858
php-mysql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a083c9ad5a0aef8c528abb1123bb88aa
php-odbc-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 7df60aec5a0b642ea6e8fcb8ae4e0bc4
php-pgsql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: bdbfcb35354ad079d4a15a4054f2caf8
 
IA-64:
php-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 0de57ca1d1f8ad29f509288a9c67f501
php-devel-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: b386f3eacea485b36525055006fa89c5
php-imap-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 91b7f7262828ad5c9f17d8e1e02bd9e1
php-ldap-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: bb5d71d5964ed4e3ebaba5c1e755599c
php-manual-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2d1d721016880e26c041d36af289288f
php-mysql-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 74de741c6420b49591eb82e8d3109286
php-odbc-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: ac98627c368011e8bc123fab619131fa
php-pgsql-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 101f908d73b7182821a6ca553df4c3f5
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
php-4.1.2-2.8.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: b00da9890a6407ceeefde6af712335a8
 
IA-32:
php-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 49c5170d0254ab6852ed1a0ec99ee005
php-devel-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: fbbf8ecb1d8212fb61ab03cb582fa6ba
php-imap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a8cc27adc804ac40f5530f5bc305209b
php-ldap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2b9e509db230478986a620bccf3c3595
php-manual-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 296c22cd73b830fc0455a3cc00b38858
php-mysql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a083c9ad5a0aef8c528abb1123bb88aa
php-odbc-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 7df60aec5a0b642ea6e8fcb8ae4e0bc4
php-pgsql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: bdbfcb35354ad079d4a15a4054f2caf8
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
php-4.1.2-2.8.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: b00da9890a6407ceeefde6af712335a8
 
IA-32:
php-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 49c5170d0254ab6852ed1a0ec99ee005
php-devel-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: fbbf8ecb1d8212fb61ab03cb582fa6ba
php-imap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a8cc27adc804ac40f5530f5bc305209b
php-ldap-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2b9e509db230478986a620bccf3c3595
php-manual-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 296c22cd73b830fc0455a3cc00b38858
php-mysql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: a083c9ad5a0aef8c528abb1123bb88aa
php-odbc-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 7df60aec5a0b642ea6e8fcb8ae4e0bc4
php-pgsql-4.1.2-2.8.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: bdbfcb35354ad079d4a15a4054f2caf8
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
php-4.1.2-2.8.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: b00da9890a6407ceeefde6af712335a8
 
IA-64:
php-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 0de57ca1d1f8ad29f509288a9c67f501
php-devel-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: b386f3eacea485b36525055006fa89c5
php-imap-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 91b7f7262828ad5c9f17d8e1e02bd9e1
php-ldap-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: bb5d71d5964ed4e3ebaba5c1e755599c
php-manual-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2d1d721016880e26c041d36af289288f
php-mysql-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 74de741c6420b49591eb82e8d3109286
php-odbc-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: ac98627c368011e8bc123fab619131fa
php-pgsql-4.1.2-2.8.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 101f908d73b7182821a6ca553df4c3f5
 

Bugs fixed (see bugzilla for more information)

195495 - CVE-2002-2214 php imap To header buffer overflow
196257 - CVE-2006-3017 zend_hash_del bug
197050 - CVE-2006-1494 PHP tempname open_basedir issue


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/