Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in php4 und php5
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in php4 und php5
ID: SUSE-SA:2006:067
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 8, SUSE Linux Openexchange Server 4, SUSE UnitedLinux 1.0, SUSE Linux Standard Server 8, SUSE Linux School Server, SUSE Linux Enterprise Server 9, SUSE Linux 9.3, SUSE Open Enterprise Server, SUSE Linux 10.0, SUSE LINUX 10.1, SUSE SLE SDK 10, SUSE SLES 10, SUSE Novell Linux POS 9, SUSE LINUX Retail Solution 8
Datum: Mi, 15. November 2006, 13:56
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
Applikationen: PHP, PHP

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

SUSE Security Announcement

Package: php4,php5
Announcement ID: SUSE-SA:2006:067
Date: Wed, 15 Nov 2006 13:00:00 +0000
Affected Products: Novell Linux POS 9
Open Enterprise Server
SLE SDK 10
SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SuSE Linux Enterprise Server 8
SuSE Linux Openexchange Server 4
SUSE LINUX Retail Solution 8
SuSE Linux School Server
SuSE Linux Standard Server 8
SUSE SLES 10
SUSE SLES 9
UnitedLinux 1.0
Vulnerability Type: remote code execution
Severity (1-10): 5
SUSE Default Package: no
Cross-References: CVE-2006-5465

Content of This Advisory:
1) Security Vulnerability Resolved:
htmlentities/htmlspecialchars security problem
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

This update fixes the following security problems in the PHP scripting
language:

- CVE-2006-5465: Various buffer overflows in htmlentities /
htmlspecialchars internal routines could be used to crash the
PHP interpreter or potentially execute code, depending on the PHP
application used.

2) Solution or Work-Around

There is no known workaround, please install the update packages.

3) Special Instructions and Notes

Please close and restart all running instances of Apache after the update.

4) Package Location and Checksums

The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command

rpm -Fhv <file.rpm>

to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.


x86 Platform:

SUSE LINUX 10.1:
apache2-mod_php5-5.1.2-29.22.i586.rpm
e57faa80b680e8b814b453c00d6056e0
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/php5-5.1.2-29.22.i586.rpm
0d3e0e486207b46738fef33974ea756f
php5-bcmath-5.1.2-29.22.i586.rpm
a5dd93bdd188f701d177f332c0a55500
php5-curl-5.1.2-29.22.i586.rpm
9e93b00f0216801359a1ed324a65d0fd
php5-dba-5.1.2-29.22.i586.rpm
aa15b807cd189e88b7f30a7cd9c744db
php5-devel-5.1.2-29.22.i586.rpm
ba6c9a988609fcce31c3afc4ba9c9e60
php5-dom-5.1.2-29.22.i586.rpm
5bad8ee3d16b064fc5efd84dd64b0838
php5-exif-5.1.2-29.22.i586.rpm
d8010101b12dee6e55d5b14f9c463940
php5-fastcgi-5.1.2-29.22.i586.rpm
603ad80865068613d5c00aa75c105795
php5-ftp-5.1.2-29.22.i586.rpm
7693420c2bb38649715f4ebf13b750a0
php5-gd-5.1.2-29.22.i586.rpm
897159ca99eab83235d1398010655fdf
php5-iconv-5.1.2-29.22.i586.rpm
50b9393db3bb04d196b5da76f27527b3
php5-imap-5.1.2-29.22.i586.rpm
84fa47af4e3b15b2467f63c57b6bcfe6
php5-ldap-5.1.2-29.22.i586.rpm
95ed616dbd9e7540ad1744434907960c
php5-mbstring-5.1.2-29.22.i586.rpm
68994bcb46af786aca3fd888bc815722
php5-mysql-5.1.2-29.22.i586.rpm
b61972de0f3213f3037ce37a5b897be7
php5-mysqli-5.1.2-29.22.i586.rpm
aae68afa2af2d0d4fcce18daf0639df7
php5-pdo-5.1.2-29.22.i586.rpm
41e2c224dd1ac7b6f66a7e745931b000
php5-pear-5.1.2-29.22.i586.rpm
02364d8f8a53b0a54bb7042f4ab67970
php5-pgsql-5.1.2-29.22.i586.rpm
dc869ef20138b5b02a305f7c18213652
php5-soap-5.1.2-29.22.i586.rpm
aab3d499075097d4b6833a62180a8d1d
php5-wddx-5.1.2-29.22.i586.rpm
9677f236aca423ff36bf5b00863abb47
php5-xmlrpc-5.1.2-29.22.i586.rpm
be37a78bcd35b9eedc708dd110bd99bf

SUSE LINUX 10.0:
apache2-mod_php4-4.4.0-6.22.i586.rpm
3897b132d043814a1c8e43f6139fee76
apache2-mod_php5-5.0.4-9.22.i586.rpm
543c37978b77cfd044b71737962fcd2c
php4-4.4.0-6.22.i586.rpm
4c7df6649be25c769fc9d2da2b581c84
php4-curl-4.4.0-6.22.i586.rpm
1d7ac601f57464c640185e485fd37d5f
php4-devel-4.4.0-6.22.i586.rpm
99dcbc288737fd7c4e42c2021f7b73f1
php4-exif-4.4.0-6.22.i586.rpm
81c7d67483b221902ab2d503f3818bae
php4-fastcgi-4.4.0-6.22.i586.rpm
b14e808651633396dc7e49867e904b88
php4-gd-4.4.0-6.22.i586.rpm
0ea0c71655f4a820c04b67aa76dcc86f
php4-imap-4.4.0-6.22.i586.rpm
c73c1d12eccdf9a7f297d7db09bbc715
php4-mbstring-4.4.0-6.22.i586.rpm
67e12d875134f977a2a58b1432b66a21
php4-pgsql-4.4.0-6.22.i586.rpm
e6bd99bf67bcaf237ff9c97b99a41e09
php4-servlet-4.4.0-6.22.i586.rpm
0699887baee8cd9b1ec6cffb4b26f242
php4-session-4.4.0-6.22.i586.rpm
6b803ad945a8198d61dafbac651d648a
php4-unixODBC-4.4.0-6.22.i586.rpm
5dfe0505a4d5f18e1263e04398847336
php4-wddx-4.4.0-6.22.i586.rpm
357376a0ab799df8099c01c0413c7676
php5-5.0.4-9.22.i586.rpm
cdbbb45a419cf429fbfcdbbd38c199bf
php5-bcmath-5.0.4-9.22.i586.rpm
7d8a61934f86b61cc616d0050d1ec229
php5-curl-5.0.4-9.22.i586.rpm
b44753f46245e6a07d4862a35c9e84c4
php5-devel-5.0.4-9.22.i586.rpm
692f6171237488467b6a02ebf1b8d580
php5-dom-5.0.4-9.22.i586.rpm
bc9920e010e991e33dea51a006a850d0
php5-exif-5.0.4-9.22.i586.rpm
316275142505124fd5a2efe5b6520448
php5-fastcgi-5.0.4-9.22.i586.rpm
4e198a40b6cfcd2ddffa1c323c7accc5
php5-ftp-5.0.4-9.22.i586.rpm
7d6aa289c517c4b079242141b27e6fa3
php5-gd-5.0.4-9.22.i586.rpm
44f7cf2fbb12dd41c984b4acd762363e
php5-iconv-5.0.4-9.22.i586.rpm
019dc26777503bdc6a26afb9c6b7787f
php5-imap-5.0.4-9.22.i586.rpm
982f745d157a6d836cdb3367ce74bad0
php5-ldap-5.0.4-9.22.i586.rpm
66e5aa36f470cd62364593e9b0e13cb0
php5-mbstring-5.0.4-9.22.i586.rpm
41f1187c34074c970df8c91e42dbcb00
php5-mysql-5.0.4-9.22.i586.rpm
884911ef2a69326b85ee5708c5acced5
php5-mysqli-5.0.4-9.22.i586.rpm
d5a05f13e1f07c5d831d46a9b012addd
php5-pear-5.0.4-9.22.i586.rpm
62ef54bf00690560663f83e7b6a1c9b5
php5-pgsql-5.0.4-9.22.i586.rpm
6805d9a45fa2c786871c9400da85fa8f
php5-soap-5.0.4-9.22.i586.rpm
120e893030fd3e12254a71bdbbc68270
php5-wddx-5.0.4-9.22.i586.rpm
4bc2252ca0c8028fbd7a9c56f141866e
php5-xmlrpc-5.0.4-9.22.i586.rpm
ede8c82fcf65472a2a210d47ac6d72ef

SUSE LINUX 9.3:
apache2-mod_php4-4.3.10-14.32.i586.rpm
bb37ace522b4b247390a7d2fd343fc2a
apache2-mod_php5-5.0.3-14.32.i586.rpm
9f0444505823bab0e457b2eee503866b
mod_php4-servlet-4.3.10-14.32.i586.rpm
17c64ffd909692f981df6333cbbb955d
php4-4.3.10-14.32.i586.rpm
eaa0781c6629df13434fc4e6029a5ec9
php4-curl-4.3.10-14.32.i586.rpm
fd7815b14025ede01b0827fa4115a39b
php4-devel-4.3.10-14.32.i586.rpm
1732cfe246bda05fc0f23878550f36e0
php4-exif-4.3.10-14.32.i586.rpm
55ce1169fa5c9708e5b95e37e2523817
php4-fastcgi-4.3.10-14.32.i586.rpm
ee9d8d6b2a4686b4dcec90de9a16d3f4
php4-gd-4.3.10-14.32.i586.rpm
c87cc42a8fd2b5d3196efeb23ce0aa7b
php4-imap-4.3.10-14.32.i586.rpm
dccf0660b072c7e5cb05b5c3cbbc46df
php4-mbstring-4.3.10-14.32.i586.rpm
eb2f95bed73b5331ce0580a9ffff83ee
php4-pear-4.3.10-14.32.i586.rpm
c2f18db717d1b8d6b00959d7016fd794
php4-pgsql-4.3.10-14.32.i586.rpm
94182fd233a1679ce6041a2b345df264
php4-session-4.3.10-14.32.i586.rpm
188028fdd1b848bd4ae78e599a29ea0b
php4-sysvshm-4.3.10-14.32.i586.rpm
49b9f294d486ef7b484162f498544648
php4-wddx-4.3.10-14.32.i586.rpm
3821484ea933a0b219e3355ec5f27267
php5-5.0.3-14.32.i586.rpm
66629a2e3f6a7169d78f02bf80ca768a
php5-bcmath-5.0.3-14.32.i586.rpm
8002c9d4569a7912e1fe99acb9a1a9fd
php5-curl-5.0.3-14.32.i586.rpm
003e4c98e666d8630a4833e82f54c094
php5-dba-5.0.3-14.32.i586.rpm
819e085ff04cd8dfd68bf48bd634ac80
php5-devel-5.0.3-14.32.i586.rpm
6e7fad4cf64d3af432c17cffb4afe53f
php5-dom-5.0.3-14.32.i586.rpm
e195afa01a59ea612d4c351d623c6f07
php5-exif-5.0.3-14.32.i586.rpm
644f800c519219ac22a5fd891c28e9f3
php5-fastcgi-5.0.3-14.32.i586.rpm
ad73d2a39e03d592b40faf62b83bae5a
php5-ftp-5.0.3-14.32.i586.rpm
64133e5d6bb271fae04157a971ba5e7e
php5-gd-5.0.3-14.32.i586.rpm
8ced63cb7f9515df21f6d75603c88a20
php5-iconv-5.0.3-14.32.i586.rpm
1b0dc063ee1ab5498eee7fa24ffd2333
php5-imap-5.0.3-14.32.i586.rpm
5d9f4b27cc1acc61c6e2458bf5e855db
php5-ldap-5.0.3-14.32.i586.rpm
64aec2679c4e6f2d92d8ef83c9297afc
php5-mbstring-5.0.3-14.32.i586.rpm
96caffd7d8065013cba3757a600a013d
php5-mysql-5.0.3-14.32.i586.rpm
f98a7b2347844a10ec579adcaac6cffb
php5-mysqli-5.0.3-14.32.i586.rpm
066a093ad825d0f21c57db9af739828e
php5-pear-5.0.3-14.32.i586.rpm
d7c45643721143767c27e78978b5c009
php5-pgsql-5.0.3-14.32.i586.rpm
281b03ecdaee24d10a66e17c321d1d7e
php5-soap-5.0.3-14.32.i586.rpm
956125aff1b6235de761216f8b0ac3f2
php5-sysvmsg-5.0.3-14.32.i586.rpm
2c8eadd0a14e89d36092a4dac12637b0
php5-sysvshm-5.0.3-14.32.i586.rpm
f59ebf805fcdb12197332adbf6170428
php5-wddx-5.0.3-14.32.i586.rpm
597e0ada90ad127e2e93fb2bd2dd86e7
php5-xmlrpc-5.0.3-14.32.i586.rpm
5782f46660584961b864d82504169f1f

Power PC Platform:

SUSE LINUX 10.1:
apache2-mod_php5-5.1.2-29.22.ppc.rpm
5c3a7490baf29e40af9fe2c971805d02
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-5.1.2-29.22.ppc.rpm
a880773b9488ef82c8bb82a0f8d64c2c
php5-bcmath-5.1.2-29.22.ppc.rpm
89619e16cdf1a2b2dbf9244e80c3cf7c
php5-curl-5.1.2-29.22.ppc.rpm
63ccc700c51c27917f807bea38cff534
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-dba-5.1.2-29.22.ppc.rpm
c1a5dbaf241fbec03da3c1ef9d349a34
php5-devel-5.1.2-29.22.ppc.rpm
61e718029e2a12d78c197f7e728fc152
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-dom-5.1.2-29.22.ppc.rpm
77600cb98af2227a88e6e7ce700e142e
php5-exif-5.1.2-29.22.ppc.rpm
9f791a6cb12aaffcd0bd4a24fa6c8511
php5-fastcgi-5.1.2-29.22.ppc.rpm
5420eeb95db2c6ffbf711edefcb86f52
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-ftp-5.1.2-29.22.ppc.rpm
20236329aea2add5d1cf4763ababec36
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-gd-5.1.2-29.22.ppc.rpm
ee6af188441aef34e0c8bbe45b50da49
php5-iconv-5.1.2-29.22.ppc.rpm
8bcecc900683d37aeb634e3b1a1010fd
php5-imap-5.1.2-29.22.ppc.rpm
9d638ddce967a3eb68a9463172d06997
php5-ldap-5.1.2-29.22.ppc.rpm
343457755b73a1bcc99fa6e88e29e9f3
php5-mbstring-5.1.2-29.22.ppc.rpm
554cb0e394d142db3d62344cdd1c3c90
php5-mysql-5.1.2-29.22.ppc.rpm
7194677f6fa9278d0a41a2b984128f27
php5-mysqli-5.1.2-29.22.ppc.rpm
38199b3a107c8e6bafd6d8a98328d6ca
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/php5-pdo-5.1.2-29.22.ppc.rpm
3b875741eaf749e5b7de88191dea32d7
php5-pear-5.1.2-29.22.ppc.rpm
286c52d8e775f6ff53126f2f8d6fa374
php5-pgsql-5.1.2-29.22.ppc.rpm
ba171044ac3d74b24bfbc8cb44cd1ae1
php5-soap-5.1.2-29.22.ppc.rpm
25397498ac1e37d5ebbe4637b045e815
php5-wddx-5.1.2-29.22.ppc.rpm
81939a0dddc8231c770209c31c93da1b
php5-xmlrpc-5.1.2-29.22.ppc.rpm
e4644d303ab5b33091491e04b9dfe733

SUSE LINUX 10.0:
apache2-mod_php4-4.4.0-6.22.ppc.rpm
d404506a09bd562e1f7b87f6f221ab1a
apache2-mod_php5-5.0.4-9.22.ppc.rpm
f6739e7e780cbf3ce4aad072c25b6dfd
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/php4-4.4.0-6.22.ppc.rpm
0a52fbe377b254093666edcee6301ecf
php4-curl-4.4.0-6.22.ppc.rpm
efab9fd837dc2a9e5dede5896f8b2b5e
php4-devel-4.4.0-6.22.ppc.rpm
7cc6c67091b82390e32f3abc6ff7f476
php4-exif-4.4.0-6.22.ppc.rpm
06e05a03648245f56140aca7a77434f7
php4-fastcgi-4.4.0-6.22.ppc.rpm
8188b67aef4d2e09a6a3179bac6fa39f
php4-gd-4.4.0-6.22.ppc.rpm
daa6610ac8740e46f932451f15460215
php4-imap-4.4.0-6.22.ppc.rpm
258a9ea50a76c6f80e247c2fe7a191c7
php4-mbstring-4.4.0-6.22.ppc.rpm
cdd1e67afc23c92e182c8238acc7acbb
php4-pgsql-4.4.0-6.22.ppc.rpm
9d9a03a033d30aab7645c6ca7bf91fdc
php4-session-4.4.0-6.22.ppc.rpm
6f25188aec42f75e5b7c6ea7db1d9624
php4-unixODBC-4.4.0-6.22.ppc.rpm
ea11aa7202c1b2917baf25763c8c536d
php4-wddx-4.4.0-6.22.ppc.rpm
f8e8c682fc2cee7f43f2041f3fe2171d
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/php5-5.0.4-9.22.ppc.rpm
ab488088003f0f10767ccbeae3863f10
php5-bcmath-5.0.4-9.22.ppc.rpm
94c108542cbba53077083fad6ed6e229
php5-curl-5.0.4-9.22.ppc.rpm
0c5ed8bd0070c5adfdd99d326ee0317d
php5-devel-5.0.4-9.22.ppc.rpm
78726d6e058fa0a13e6a819f5d5e778f
php5-dom-5.0.4-9.22.ppc.rpm
580a53f563a25992dfa347b97a6b013f
php5-exif-5.0.4-9.22.ppc.rpm
1bd5e9f4f120243fb774beae7145888f
php5-fastcgi-5.0.4-9.22.ppc.rpm
f6d4e0bcd096c9d9f4d70d50f45e7030
php5-ftp-5.0.4-9.22.ppc.rpm
8492aec117ee3148fbe1c3eaded1a467
php5-gd-5.0.4-9.22.ppc.rpm
0477685cc29f90ae22ab5874d9271949
php5-iconv-5.0.4-9.22.ppc.rpm
7852ec943ea7701b7a02885707c71690
php5-imap-5.0.4-9.22.ppc.rpm
f900227644985f54a7599d86cf1e58ff
php5-ldap-5.0.4-9.22.ppc.rpm
7a1a0479746fe9e2b912fda755548265
php5-mbstring-5.0.4-9.22.ppc.rpm
209858e52b723b928445be3f7d399c82
php5-mysql-5.0.4-9.22.ppc.rpm
a4485ab476f08cc68b896e9946d9a7ae
php5-mysqli-5.0.4-9.22.ppc.rpm
64d70ed3ed35940336e2c77199fa2aa1
php5-pear-5.0.4-9.22.ppc.rpm
01e27cc86e2b3565788e573bf8aec191
php5-pgsql-5.0.4-9.22.ppc.rpm
c0acf6c7b3d917ec14d5b6af6794edb6
php5-soap-5.0.4-9.22.ppc.rpm
692dee19cd40eafdc3b349c8afad2997
php5-wddx-5.0.4-9.22.ppc.rpm
e42dbdb0ab48b392e03014ddaf04fd40
php5-xmlrpc-5.0.4-9.22.ppc.rpm
e40ba04a3c5c597926ac379ff318dfbb

x86-64 Platform:

SUSE LINUX 10.1:
apache2-mod_php5-5.1.2-29.22.x86_64.rpm
2d8a739b4cecd9882d0eb082b6a69348
php5-5.1.2-29.22.x86_64.rpm
7b1e56bff005296875899b9147fad095
php5-bcmath-5.1.2-29.22.x86_64.rpm
9dc6cb876887bdb8127e153d0d555dcd
php5-curl-5.1.2-29.22.x86_64.rpm
a4a5903adf9454a9029a2ea35a8dc79b
php5-dba-5.1.2-29.22.x86_64.rpm
1adc8547eac04fe1672c0290291683fb
php5-devel-5.1.2-29.22.x86_64.rpm
fd5aca9e425470708b2af5fa5b6a990e
php5-dom-5.1.2-29.22.x86_64.rpm
f0b2064b6e8bf9643dbac2a2ee9b071b
php5-exif-5.1.2-29.22.x86_64.rpm
997a8e793509037bf280e45c4fd9ae13
php5-fastcgi-5.1.2-29.22.x86_64.rpm
479d255df50e028189f9479970e3e0bf
php5-ftp-5.1.2-29.22.x86_64.rpm
2144c76e88b3edab24bd13331f6c311b
php5-gd-5.1.2-29.22.x86_64.rpm
8f94ad01f7adbf6afe7aea6cd187d412
php5-iconv-5.1.2-29.22.x86_64.rpm
e103468c9c41cfe6c47998b8eb3f8814
php5-imap-5.1.2-29.22.x86_64.rpm
f0b15d3f0452d04172e061a70654252f
php5-ldap-5.1.2-29.22.x86_64.rpm
1bf1cecddbfe202bfff5bd8065395f7b
php5-mbstring-5.1.2-29.22.x86_64.rpm
77c78f652f8f06d2f548a23a614e3bc8
php5-mysql-5.1.2-29.22.x86_64.rpm
0124292c4136557838f59e340e3af27d
php5-mysqli-5.1.2-29.22.x86_64.rpm
1d9bf118798dc9a0e17e06d92c67e22f
php5-pdo-5.1.2-29.22.x86_64.rpm
ae7e99e94409a4f9ef5b7d670ba1cc43
php5-pear-5.1.2-29.22.x86_64.rpm
7272c2eac3a3a9085fba56b12e433847
php5-pgsql-5.1.2-29.22.x86_64.rpm
6f9d55833b21afd381662d6ebfb2f65d
php5-soap-5.1.2-29.22.x86_64.rpm
3d163f1c82ed1f014ce5a3242abaee5a
php5-wddx-5.1.2-29.22.x86_64.rpm
78a7da3d4ac63cbef4233e937cfc1f11
php5-xmlrpc-5.1.2-29.22.x86_64.rpm
47a63db62d0bd26e4ad2454a27766540

SUSE LINUX 10.0:
apache2-mod_php4-4.4.0-6.22.x86_64.rpm
0ab300b70b02d407460212633859d3e0
apache2-mod_php5-5.0.4-9.22.x86_64.rpm
638ac9911ab2353d1644f3ea3f58c5dc
php4-32bit-4.4.0-6.22.x86_64.rpm
b3189fd4e0c577a4caf26ef3d88f3e2d
php4-4.4.0-6.22.x86_64.rpm
ceb7c679a3ff01072317cf7389e87e86
php4-curl-4.4.0-6.22.x86_64.rpm
52cf201fc735a69ec7330a1cc90f4234
php4-devel-4.4.0-6.22.x86_64.rpm
4c58e2303b7d497e103ad9d32f33c595
php4-exif-4.4.0-6.22.x86_64.rpm
9cf2ea8f7d1e57d4ac0db96ecaae389b
php4-fastcgi-4.4.0-6.22.x86_64.rpm
8277d4cab2a14efdec945e6ce52e95bf
php4-gd-4.4.0-6.22.x86_64.rpm
cd9b4bf7369542894d50b60acd872d05
php4-imap-4.4.0-6.22.x86_64.rpm
b2dc740f8957d92bf8cf9896fdd879e6
php4-mbstring-4.4.0-6.22.x86_64.rpm
8f6b9a6f62ff68ac7f41330d6944c761
php4-pgsql-4.4.0-6.22.x86_64.rpm
2b7677cae8889cd37877b4f1bc0b8844
php4-servlet-4.4.0-6.22.x86_64.rpm
428972817272275762d79b98aeeb1df1
php4-session-4.4.0-6.22.x86_64.rpm
6edf5413bd4bc80114ae74fed3ac1c3c
php4-unixODBC-4.4.0-6.22.x86_64.rpm
76c9ef628b3b0776436acb83481f4bf1
php4-wddx-4.4.0-6.22.x86_64.rpm
3615d54dcf93c1ef8c3774f06d68c8e5
php5-5.0.4-9.22.x86_64.rpm
8e3a1441c72d898e3de57ebb84af2e54
php5-bcmath-5.0.4-9.22.x86_64.rpm
cafd4690d9c5cab791740efc477e0e23
php5-curl-5.0.4-9.22.x86_64.rpm
4d6ded62957dccd7866312cdb0bd9733
php5-devel-5.0.4-9.22.x86_64.rpm
936d8f4587a9a5cde6b320fa93801d71
php5-dom-5.0.4-9.22.x86_64.rpm
6d583a65c2583dbbd331b8e6cb00219b
php5-exif-5.0.4-9.22.x86_64.rpm
b0df688b3532deed5a09feb59f8ba835
php5-fastcgi-5.0.4-9.22.x86_64.rpm
e8f4d15ee2799b03e90f8ef0d914b064
php5-ftp-5.0.4-9.22.x86_64.rpm
1913a4296358c2e592d0dea24c8e9aa7
php5-gd-5.0.4-9.22.x86_64.rpm
a608e0006a05576bfc45c9eab6a741d4
php5-iconv-5.0.4-9.22.x86_64.rpm
cd65092005de210d3fe88bcfdd3df2a7
php5-imap-5.0.4-9.22.x86_64.rpm
9443711bec8934b98f02be8b9812c050
php5-ldap-5.0.4-9.22.x86_64.rpm
b547531405f519c8b502719769897fe5
php5-mbstring-5.0.4-9.22.x86_64.rpm
4d3ae6e0dca36aa033034c89154aa95c
php5-mysql-5.0.4-9.22.x86_64.rpm
977b2b53902f03178fa0425974f3a44c
php5-mysqli-5.0.4-9.22.x86_64.rpm
3fdc56c1aaabc314442d7bfdc357d296
php5-pear-5.0.4-9.22.x86_64.rpm
4a39f64d161ce79cc6b43fc9b824b873
php5-pgsql-5.0.4-9.22.x86_64.rpm
a4e422e868287e01cdcd73e05d312dc8
php5-soap-5.0.4-9.22.x86_64.rpm
6064cf384345100b2003b5d1642fa7ec
php5-wddx-5.0.4-9.22.x86_64.rpm
3abaeee3b57b267de2d1f9465039a2db
php5-xmlrpc-5.0.4-9.22.x86_64.rpm
66ea3018704c30fe88fb2d8f98dc2032

SUSE LINUX 9.3:
apache2-mod_php4-4.3.10-14.32.x86_64.rpm
87467db93691b6ba7a35c5b1813f4cb0
apache2-mod_php5-5.0.3-14.32.x86_64.rpm
0de39de077ae0df7c42c0713c8fcdda0
mod_php4-servlet-4.3.10-14.32.x86_64.rpm
a42f7164b0e676c9c04bab00f376c8f7
php4-32bit-9.3-7.14.x86_64.rpm
071099f308973b93bdf5bf0684fadf03
php4-4.3.10-14.32.x86_64.rpm
dd1090efe44a5c39a4d37e84619991d7
php4-curl-4.3.10-14.32.x86_64.rpm
0b7a436030ba91f390db2d5fda87948f
php4-devel-4.3.10-14.32.x86_64.rpm
a7362d9e9861b0440e69ac728e04dfcb
php4-exif-4.3.10-14.32.x86_64.rpm
a9fe3ff55c9ce5181ce11ca4d69fcafe
php4-fastcgi-4.3.10-14.32.x86_64.rpm
2c1137b4793f0deb54e1d48974b8049d
php4-gd-4.3.10-14.32.x86_64.rpm
9fb2a974b61581fc337c73423f761fa5
php4-imap-4.3.10-14.32.x86_64.rpm
87f0c2940065d61b55abdaf08284d8e3
php4-mbstring-4.3.10-14.32.x86_64.rpm
a0226dcc68681b3b2aef4a499c06e6e5
php4-pear-4.3.10-14.32.x86_64.rpm
5d57c4bf164fdaba6e4eae308b07e716
php4-pgsql-4.3.10-14.32.x86_64.rpm
1ff1450d5917aa89c9531829dbdbd64b
php4-session-4.3.10-14.32.x86_64.rpm
6e4bd961bd52ffc1c9aca58be9be3780
php4-sysvshm-4.3.10-14.32.x86_64.rpm
e27199d83837d59b76cfb1305f466230
php4-wddx-4.3.10-14.32.x86_64.rpm
5e9445198d0d7bb43e23f7d889c46268
php5-5.0.3-14.32.x86_64.rpm
7be9597720a390d414481d9630b97176
php5-bcmath-5.0.3-14.32.x86_64.rpm
218a4f1a61f5073c0af5b7225f70762d
php5-curl-5.0.3-14.32.x86_64.rpm
a103af05a4941936d575c0429fb76798
php5-dba-5.0.3-14.32.x86_64.rpm
a8919a941dc32a3743c798b4bb00fbd3
php5-devel-5.0.3-14.32.x86_64.rpm
65bde3ea9e0435178aed6f2c3eb6cc8e
php5-dom-5.0.3-14.32.x86_64.rpm
6fb7f1331283ca7c3bc37ec5058afea2
php5-exif-5.0.3-14.32.x86_64.rpm
94404361d39de30930136e637184a05a
php5-fastcgi-5.0.3-14.32.x86_64.rpm
344fcd4f499331d06c4692a82232d276
php5-ftp-5.0.3-14.32.x86_64.rpm
9f7f87e14866a9bcf3f13c49c6a173f9
php5-gd-5.0.3-14.32.x86_64.rpm
ab1b7ae7aebae896f2dd211d1763dfc1
php5-iconv-5.0.3-14.32.x86_64.rpm
f5cd1145b6252cb467e8a50c1c27520d
php5-imap-5.0.3-14.32.x86_64.rpm
ae8ba21ba946c489b6d74a96b4c09d93
php5-ldap-5.0.3-14.32.x86_64.rpm
48b02728261eb7c44a55eb07717f2fd2
php5-mbstring-5.0.3-14.32.x86_64.rpm
32b81d5e55aa4bcdaf08a3103ca1a5cc
php5-mysql-5.0.3-14.32.x86_64.rpm
0dafcda7b4dc9a69a31a6d91face802d
php5-mysqli-5.0.3-14.32.x86_64.rpm
92f545d335d7eb0527c8c9cb10827d27
php5-pear-5.0.3-14.32.x86_64.rpm
056280dea69e55cf858bc153646e3ee4
php5-pgsql-5.0.3-14.32.x86_64.rpm
4998c6ff01a4c81e6fd34825adf9c6b4
php5-soap-5.0.3-14.32.x86_64.rpm
ae481915b9f32f134f33e00bd37c9c36
php5-sysvmsg-5.0.3-14.32.x86_64.rpm
92026592609fa5e801346f0c68c794ab
php5-sysvshm-5.0.3-14.32.x86_64.rpm
ca96913fbe26855107b6627b643ec9b2
php5-wddx-5.0.3-14.32.x86_64.rpm
1de32e83cf551fe35fe58a0d9ff89437
php5-xmlrpc-5.0.3-14.32.x86_64.rpm
5a1150fe6f80c6246194184e025187bf

Sources:

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/php5-5.1.2-29.22.src.rpm
955dd593b249671b49c0468a801fc40f

SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/php4-4.4.0-6.22.src.rpm
5f61fde7f4967668ebc09c5420c2121d
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/php5-5.0.4-9.22.src.rpm
f5aad91ffaaba5cbaa43f0e321b2ef1f

SUSE LINUX 9.3:
php4-4.3.10-14.32.src.rpm
3e00697cb7dfff72f03eb4e36ff4308c
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/php5-5.0.3-14.32.src.rpm
fbfd0640c942ea0fcaf623cd48d03dfa

Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:

SUSE SLES 10
95aa269a50d6438793d154b7db556119.html
95aa269a50d6438793d154b7db556119.html

Open Enterprise Server
Novell Linux POS 9
SUSE SLES 9
2a0a69ad2fa154c13d238e3177db3736.html

UnitedLinux 1.0
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8
SuSE Linux Standard Server 8
SuSE Linux School Server
SUSE LINUX Retail Solution 8
7ff98a5ba0483fdee45151d8d34c3d7b.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

- Announcement authenticity verification:

SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.

To verify the signature of the announcement, save it as text into a file
and run the command

gpg --verify <file>

replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:

gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team
<security@suse.de>"

where <DATE> is replaced by the date the document was signed.

If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command

gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

- Package authenticity verification:

SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.

There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:

1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement

1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command

rpm -v --checksig <file.rpm>

to verify the signature of the package, replacing <file.rpm> with
the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.

This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.

2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command

md5sum <filename.rpm>

after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.

- SUSE runs two security mailing lists to which any interested party may
subscribe:

suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-subscribe@suse.com>.

suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-announce-subscribe@suse.com>.

For general information or the frequently asked questions (FAQ),
send mail to <suse-security-info@suse.com> or
<suse-security-faq@suse.com>.

=====================================================================
SUSE's security contact is <security@suse.com> or
<security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________

The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.

SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.

Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRVsM8Xey5gA9JdPZAQJIaAgAlhcf4FJc+SaXOsJ+Hn6GqahaaA7ffdgR
GbQvlzqqLJoWvdnMylBl2jZ5MLAWRn0wJ14hzCABxSy9MDEonCroBmGIOyQh7OcN
8VdwRb2AqoGcNrGwK3CxbSuQQzb+TzI63zMBciPotPQkRXYrkl1+E4zgiZuK46EQ
b0MRQ7eVDTJUuppNo+eDFp1vOPOONzW2KaEb+hSDHXdkeN35IDXXz1n8mxYv6Tjj
Y1R7k1wh0Ccb5BIZY7UDswK/CObVDNvHojBMsM1occ8TGf8p4LlZ/RsoE2GNGYlw
CddmmGl+gA8wgwfa+6jRzXj6v99m9QLWhFnd+uTetPBvvJYk9AVQqA==
=qixA
-----END PGP SIGNATURE-----

--
To unsubscribe, e-mail: suse-security-announce-unsubscribe@suse.com
For additional commands, e-mail: suse-security-announce-help@suse.com
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung