openSUSE-SU-2011:1138-1: moderate: php5
openSUSE Security Update: php5 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1138-1 Rating: moderate References: #699711 #701491 #709549 #715640 #715646 Cross-References: CVE-2011-2202 CVE-2011-2483 CVE-2011-3267 CVE-2011-3268 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves four vulnerabilities and has one errata is now available. Description: The blowfish password hashing implementation did not properly handle 8-characters in passwords, which made it easier for attackers to crack the hash (CVE-2011-2483). After this update existing hashes with id "$2a$" for passwords that contain 8-bit characters will no longer be compatible with newly generated hashes. Affected users will either have to change their password to store a new hash or the id of the existing hash has to be manually changed to "$2x$" in order to activate a compat mode. Please see the description of the CVE-2011-2483 glibc update for details. File uploads could potentially overwrite files owned by the user running php (CVE-2011-2202). A long salt argument to the crypt function could cause a buffer overflow (CVE-2011-3268) Incorrect implementation of the error_log function could crash php (CVE-2011-3267) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch apache2-mod_php5-5113 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): apache2-mod_php5-5.3.5-5.16.1 php5-5.3.5-5.16.1 php5-bcmath-5.3.5-5.16.1 php5-bz2-5.3.5-5.16.1 php5-calendar-5.3.5-5.16.1 php5-ctype-5.3.5-5.16.1 php5-curl-5.3.5-5.16.1 php5-dba-5.3.5-5.16.1 php5-devel-5.3.5-5.16.1 php5-dom-5.3.5-5.16.1 php5-enchant-5.3.5-5.16.1 php5-exif-5.3.5-5.16.1 php5-fastcgi-5.3.5-5.16.1 php5-fileinfo-5.3.5-5.16.1 php5-fpm-5.3.5-5.16.1 php5-ftp-5.3.5-5.16.1 php5-gd-5.3.5-5.16.1 php5-gettext-5.3.5-5.16.1 php5-gmp-5.3.5-5.16.1 php5-hash-5.3.5-5.16.1 php5-iconv-5.3.5-5.16.1 php5-imap-5.3.5-5.16.1 php5-intl-5.3.5-5.16.1 php5-json-5.3.5-5.16.1 php5-ldap-5.3.5-5.16.1 php5-mbstring-5.3.5-5.16.1 php5-mcrypt-5.3.5-5.16.1 php5-mysql-5.3.5-5.16.1 php5-odbc-5.3.5-5.16.1 php5-openssl-5.3.5-5.16.1 php5-pcntl-5.3.5-5.16.1 php5-pdo-5.3.5-5.16.1 php5-pgsql-5.3.5-5.16.1 php5-phar-5.3.5-5.16.1 php5-posix-5.3.5-5.16.1 php5-pspell-5.3.5-5.16.1 php5-readline-5.3.5-5.16.1 php5-shmop-5.3.5-5.16.1 php5-snmp-5.3.5-5.16.1 php5-soap-5.3.5-5.16.1 php5-sockets-5.3.5-5.16.1 php5-sqlite-5.3.5-5.16.1 php5-suhosin-5.3.5-5.16.1 php5-sysvmsg-5.3.5-5.16.1 php5-sysvsem-5.3.5-5.16.1 php5-sysvshm-5.3.5-5.16.1 php5-tidy-5.3.5-5.16.1 php5-tokenizer-5.3.5-5.16.1 php5-wddx-5.3.5-5.16.1 php5-xmlreader-5.3.5-5.16.1 php5-xmlrpc-5.3.5-5.16.1 php5-xmlwriter-5.3.5-5.16.1 php5-xsl-5.3.5-5.16.1 php5-zip-5.3.5-5.16.1 php5-zlib-5.3.5-5.16.1 - openSUSE 11.4 (noarch): php5-pear-5.3.5-5.16.1 References: http://support.novell.com/security/cve/CVE-2011-2202.html http://support.novell.com/security/cve/CVE-2011-2483.html http://support.novell.com/security/cve/CVE-2011-3267.html http://support.novell.com/security/cve/CVE-2011-3268.html https://bugzilla.novell.com/699711 https://bugzilla.novell.com/701491 https://bugzilla.novell.com/709549 https://bugzilla.novell.com/715640 https://bugzilla.novell.com/715646
participants (1)
-
opensuse-security@opensuse.org