SUSE-SU-2012:0496-1: important: Security update for PHP5
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Apr 12 15:08:13 MDT 2012
SUSE Security Update: Security update for PHP5
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0496-1
Rating: important
References: #699711 #709549 #713652 #728671 #733590 #735613
#736169 #738221 #741520 #741859 #742273 #742806
#743308 #744966 #746661 #749111
Cross-References: CVE-2011-1072 CVE-2011-1466 CVE-2011-2202
CVE-2011-3182 CVE-2011-4153 CVE-2011-4566
CVE-2011-4885 CVE-2012-0057 CVE-2012-0781
CVE-2012-0788 CVE-2012-0789 CVE-2012-0807
CVE-2012-0830 CVE-2012-0831
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
______________________________________________________________________________
An update that solves 14 vulnerabilities and has two fixes
is now available. It includes one version update.
Description:
This update of php5 fixes multiple security flaws:
* CVE-2011-2202: A php5 upload filename injection was
fixed.
* CVE-2011-4566: A integer overflow in the EXIF
extension was fixed that could be used by attackers to
crash the interpreter or potentially read memory
* CVE-2011-3182: Multiple NULL pointer dereferences
were fixed that could lead to crashes
* CVE-2011-1466: An integer overflow in the PHP
calendar extension was fixed that could have led to crashes.
* CVE-2011-1072: A symlink vulnerability in the PEAR
installer could be exploited by local attackers to inject
code.
* CVE-2011-4153: missing checks of return values could
allow remote attackers to cause a denial of service (NULL
pointer dereference)
* CVE-2011-4885: denial of service via hash collisions
* CVE-2012-0057: specially crafted XSLT stylesheets
could allow remote attackers to create arbitrary files with
arbitrary content
* CVE-2012-0781: remote attackers can cause a denial of
service via specially crafted input to an application that
attempts to perform Tidy::diagnose operations
* CVE-2012-0788: applications that use a PDO driver
were prone to denial of service flaws which could be
exploited remotely
* CVE-2012-0789: memory leak in the timezone
functionality could allow remote attackers to cause a
denial of service (memory consumption)
* CVE-2012-0807: a stack based buffer overflow in the
php5 Suhosin extension could allow remote attackers to
execute arbitrary code via a long string that is used in a
Set-Cookie HTTP header
* CVE-2012-0830: this fixes an incorrect fix for
CVE-2011-4885 which could allow remote attackers to execute
arbitrary code via a request containing a large number of
variables
* CVE-2012-0831: temporary changes to the
magic_quotes_gpc directive during the importing of
environment variables is not properly performed which makes
it easier for remote attackers to conduct SQL injections
Also the following bugs have been fixed:
* allow uploading files bigger than 2GB for 64bit
systems [bnc#709549]
* amend README.SUSE to discourage using apache module
with apache2-worker [bnc#728671]
Security Issue references:
* CVE-2011-2202
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202
>
* CVE-2011-4153
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153
>
* CVE-2011-4885
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885
>
* CVE-2012-0057
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0057
>
* CVE-2012-0781
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0781
>
* CVE-2012-0788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0788
>
* CVE-2012-0789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0789
>
* CVE-2012-0807
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0807
>
* CVE-2012-0830
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830
>
* CVE-2012-0831
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0831
>
* CVE-2011-4566
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566
>
* CVE-2011-3182
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3182
>
* CVE-2011-1466
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466
>
* CVE-2011-1072
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1072
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-apache2-mod_php5-5964
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-apache2-mod_php5-5964
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-apache2-mod_php5-5964
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-apache2-mod_php5-5964
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-apache2-mod_php5-5964
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.2.14]:
php5-devel-5.2.14-0.7.30.34.1
php5-imap-5.2.14-0.7.30.34.1
php5-ncurses-5.2.14-0.7.30.34.1
php5-posix-5.2.14-0.7.30.34.1
php5-readline-5.2.14-0.7.30.34.1
php5-sockets-5.2.14-0.7.30.34.1
php5-sqlite-5.2.14-0.7.30.34.1
php5-tidy-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64) [New Version: 5.2.14]:
apache2-mod_php5-5.2.14-0.7.30.34.1
php5-5.2.14-0.7.30.34.1
php5-bcmath-5.2.14-0.7.30.34.1
php5-bz2-5.2.14-0.7.30.34.1
php5-calendar-5.2.14-0.7.30.34.1
php5-ctype-5.2.14-0.7.30.34.1
php5-curl-5.2.14-0.7.30.34.1
php5-dba-5.2.14-0.7.30.34.1
php5-dbase-5.2.14-0.7.30.34.1
php5-dom-5.2.14-0.7.30.34.1
php5-exif-5.2.14-0.7.30.34.1
php5-fastcgi-5.2.14-0.7.30.34.1
php5-ftp-5.2.14-0.7.30.34.1
php5-gd-5.2.14-0.7.30.34.1
php5-gettext-5.2.14-0.7.30.34.1
php5-gmp-5.2.14-0.7.30.34.1
php5-hash-5.2.14-0.7.30.34.1
php5-iconv-5.2.14-0.7.30.34.1
php5-json-5.2.14-0.7.30.34.1
php5-ldap-5.2.14-0.7.30.34.1
php5-mbstring-5.2.14-0.7.30.34.1
php5-mcrypt-5.2.14-0.7.30.34.1
php5-mysql-5.2.14-0.7.30.34.1
php5-odbc-5.2.14-0.7.30.34.1
php5-openssl-5.2.14-0.7.30.34.1
php5-pcntl-5.2.14-0.7.30.34.1
php5-pdo-5.2.14-0.7.30.34.1
php5-pear-5.2.14-0.7.30.34.1
php5-pgsql-5.2.14-0.7.30.34.1
php5-pspell-5.2.14-0.7.30.34.1
php5-shmop-5.2.14-0.7.30.34.1
php5-snmp-5.2.14-0.7.30.34.1
php5-soap-5.2.14-0.7.30.34.1
php5-suhosin-5.2.14-0.7.30.34.1
php5-sysvmsg-5.2.14-0.7.30.34.1
php5-sysvsem-5.2.14-0.7.30.34.1
php5-sysvshm-5.2.14-0.7.30.34.1
php5-tokenizer-5.2.14-0.7.30.34.1
php5-wddx-5.2.14-0.7.30.34.1
php5-xmlreader-5.2.14-0.7.30.34.1
php5-xmlrpc-5.2.14-0.7.30.34.1
php5-xmlwriter-5.2.14-0.7.30.34.1
php5-xsl-5.2.14-0.7.30.34.1
php5-zip-5.2.14-0.7.30.34.1
php5-zlib-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.2.14]:
php5-devel-5.2.14-0.7.30.34.1
php5-imap-5.2.14-0.7.30.34.1
php5-ncurses-5.2.14-0.7.30.34.1
php5-posix-5.2.14-0.7.30.34.1
php5-readline-5.2.14-0.7.30.34.1
php5-sockets-5.2.14-0.7.30.34.1
php5-sqlite-5.2.14-0.7.30.34.1
php5-tidy-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64) [New Version: 5.2.14]:
apache2-mod_php5-5.2.14-0.7.30.34.1
php5-5.2.14-0.7.30.34.1
php5-bcmath-5.2.14-0.7.30.34.1
php5-bz2-5.2.14-0.7.30.34.1
php5-calendar-5.2.14-0.7.30.34.1
php5-ctype-5.2.14-0.7.30.34.1
php5-curl-5.2.14-0.7.30.34.1
php5-dba-5.2.14-0.7.30.34.1
php5-dbase-5.2.14-0.7.30.34.1
php5-dom-5.2.14-0.7.30.34.1
php5-exif-5.2.14-0.7.30.34.1
php5-fastcgi-5.2.14-0.7.30.34.1
php5-ftp-5.2.14-0.7.30.34.1
php5-gd-5.2.14-0.7.30.34.1
php5-gettext-5.2.14-0.7.30.34.1
php5-gmp-5.2.14-0.7.30.34.1
php5-hash-5.2.14-0.7.30.34.1
php5-iconv-5.2.14-0.7.30.34.1
php5-json-5.2.14-0.7.30.34.1
php5-ldap-5.2.14-0.7.30.34.1
php5-mbstring-5.2.14-0.7.30.34.1
php5-mcrypt-5.2.14-0.7.30.34.1
php5-mysql-5.2.14-0.7.30.34.1
php5-odbc-5.2.14-0.7.30.34.1
php5-openssl-5.2.14-0.7.30.34.1
php5-pcntl-5.2.14-0.7.30.34.1
php5-pdo-5.2.14-0.7.30.34.1
php5-pear-5.2.14-0.7.30.34.1
php5-pgsql-5.2.14-0.7.30.34.1
php5-pspell-5.2.14-0.7.30.34.1
php5-shmop-5.2.14-0.7.30.34.1
php5-snmp-5.2.14-0.7.30.34.1
php5-soap-5.2.14-0.7.30.34.1
php5-suhosin-5.2.14-0.7.30.34.1
php5-sysvmsg-5.2.14-0.7.30.34.1
php5-sysvsem-5.2.14-0.7.30.34.1
php5-sysvshm-5.2.14-0.7.30.34.1
php5-tokenizer-5.2.14-0.7.30.34.1
php5-wddx-5.2.14-0.7.30.34.1
php5-xmlreader-5.2.14-0.7.30.34.1
php5-xmlrpc-5.2.14-0.7.30.34.1
php5-xmlwriter-5.2.14-0.7.30.34.1
php5-xsl-5.2.14-0.7.30.34.1
php5-zip-5.2.14-0.7.30.34.1
php5-zlib-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.2.14]:
apache2-mod_php5-5.2.14-0.7.30.34.1
php5-5.2.14-0.7.30.34.1
php5-bcmath-5.2.14-0.7.30.34.1
php5-bz2-5.2.14-0.7.30.34.1
php5-calendar-5.2.14-0.7.30.34.1
php5-ctype-5.2.14-0.7.30.34.1
php5-curl-5.2.14-0.7.30.34.1
php5-dba-5.2.14-0.7.30.34.1
php5-dbase-5.2.14-0.7.30.34.1
php5-dom-5.2.14-0.7.30.34.1
php5-exif-5.2.14-0.7.30.34.1
php5-fastcgi-5.2.14-0.7.30.34.1
php5-ftp-5.2.14-0.7.30.34.1
php5-gd-5.2.14-0.7.30.34.1
php5-gettext-5.2.14-0.7.30.34.1
php5-gmp-5.2.14-0.7.30.34.1
php5-hash-5.2.14-0.7.30.34.1
php5-iconv-5.2.14-0.7.30.34.1
php5-json-5.2.14-0.7.30.34.1
php5-ldap-5.2.14-0.7.30.34.1
php5-mbstring-5.2.14-0.7.30.34.1
php5-mcrypt-5.2.14-0.7.30.34.1
php5-mysql-5.2.14-0.7.30.34.1
php5-odbc-5.2.14-0.7.30.34.1
php5-openssl-5.2.14-0.7.30.34.1
php5-pcntl-5.2.14-0.7.30.34.1
php5-pdo-5.2.14-0.7.30.34.1
php5-pear-5.2.14-0.7.30.34.1
php5-pgsql-5.2.14-0.7.30.34.1
php5-pspell-5.2.14-0.7.30.34.1
php5-shmop-5.2.14-0.7.30.34.1
php5-snmp-5.2.14-0.7.30.34.1
php5-soap-5.2.14-0.7.30.34.1
php5-suhosin-5.2.14-0.7.30.34.1
php5-sysvmsg-5.2.14-0.7.30.34.1
php5-sysvsem-5.2.14-0.7.30.34.1
php5-sysvshm-5.2.14-0.7.30.34.1
php5-tokenizer-5.2.14-0.7.30.34.1
php5-wddx-5.2.14-0.7.30.34.1
php5-xmlreader-5.2.14-0.7.30.34.1
php5-xmlrpc-5.2.14-0.7.30.34.1
php5-xmlwriter-5.2.14-0.7.30.34.1
php5-xsl-5.2.14-0.7.30.34.1
php5-zip-5.2.14-0.7.30.34.1
php5-zlib-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 5.2.14]:
apache2-mod_php5-5.2.14-0.7.30.34.1
php5-5.2.14-0.7.30.34.1
php5-bcmath-5.2.14-0.7.30.34.1
php5-bz2-5.2.14-0.7.30.34.1
php5-calendar-5.2.14-0.7.30.34.1
php5-ctype-5.2.14-0.7.30.34.1
php5-curl-5.2.14-0.7.30.34.1
php5-dba-5.2.14-0.7.30.34.1
php5-dbase-5.2.14-0.7.30.34.1
php5-dom-5.2.14-0.7.30.34.1
php5-exif-5.2.14-0.7.30.34.1
php5-fastcgi-5.2.14-0.7.30.34.1
php5-ftp-5.2.14-0.7.30.34.1
php5-gd-5.2.14-0.7.30.34.1
php5-gettext-5.2.14-0.7.30.34.1
php5-gmp-5.2.14-0.7.30.34.1
php5-hash-5.2.14-0.7.30.34.1
php5-iconv-5.2.14-0.7.30.34.1
php5-json-5.2.14-0.7.30.34.1
php5-ldap-5.2.14-0.7.30.34.1
php5-mbstring-5.2.14-0.7.30.34.1
php5-mcrypt-5.2.14-0.7.30.34.1
php5-mysql-5.2.14-0.7.30.34.1
php5-odbc-5.2.14-0.7.30.34.1
php5-openssl-5.2.14-0.7.30.34.1
php5-pcntl-5.2.14-0.7.30.34.1
php5-pdo-5.2.14-0.7.30.34.1
php5-pear-5.2.14-0.7.30.34.1
php5-pgsql-5.2.14-0.7.30.34.1
php5-pspell-5.2.14-0.7.30.34.1
php5-shmop-5.2.14-0.7.30.34.1
php5-snmp-5.2.14-0.7.30.34.1
php5-soap-5.2.14-0.7.30.34.1
php5-suhosin-5.2.14-0.7.30.34.1
php5-sysvmsg-5.2.14-0.7.30.34.1
php5-sysvsem-5.2.14-0.7.30.34.1
php5-sysvshm-5.2.14-0.7.30.34.1
php5-tokenizer-5.2.14-0.7.30.34.1
php5-wddx-5.2.14-0.7.30.34.1
php5-xmlreader-5.2.14-0.7.30.34.1
php5-xmlrpc-5.2.14-0.7.30.34.1
php5-xmlwriter-5.2.14-0.7.30.34.1
php5-xsl-5.2.14-0.7.30.34.1
php5-zip-5.2.14-0.7.30.34.1
php5-zlib-5.2.14-0.7.30.34.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.2.14]:
apache2-mod_php5-5.2.14-0.7.30.34.1
php5-5.2.14-0.7.30.34.1
php5-bcmath-5.2.14-0.7.30.34.1
php5-bz2-5.2.14-0.7.30.34.1
php5-calendar-5.2.14-0.7.30.34.1
php5-ctype-5.2.14-0.7.30.34.1
php5-curl-5.2.14-0.7.30.34.1
php5-dba-5.2.14-0.7.30.34.1
php5-dbase-5.2.14-0.7.30.34.1
php5-dom-5.2.14-0.7.30.34.1
php5-exif-5.2.14-0.7.30.34.1
php5-fastcgi-5.2.14-0.7.30.34.1
php5-ftp-5.2.14-0.7.30.34.1
php5-gd-5.2.14-0.7.30.34.1
php5-gettext-5.2.14-0.7.30.34.1
php5-gmp-5.2.14-0.7.30.34.1
php5-hash-5.2.14-0.7.30.34.1
php5-iconv-5.2.14-0.7.30.34.1
php5-json-5.2.14-0.7.30.34.1
php5-ldap-5.2.14-0.7.30.34.1
php5-mbstring-5.2.14-0.7.30.34.1
php5-mcrypt-5.2.14-0.7.30.34.1
php5-mysql-5.2.14-0.7.30.34.1
php5-odbc-5.2.14-0.7.30.34.1
php5-openssl-5.2.14-0.7.30.34.1
php5-pcntl-5.2.14-0.7.30.34.1
php5-pdo-5.2.14-0.7.30.34.1
php5-pear-5.2.14-0.7.30.34.1
php5-pgsql-5.2.14-0.7.30.34.1
php5-pspell-5.2.14-0.7.30.34.1
php5-shmop-5.2.14-0.7.30.34.1
php5-snmp-5.2.14-0.7.30.34.1
php5-soap-5.2.14-0.7.30.34.1
php5-suhosin-5.2.14-0.7.30.34.1
php5-sysvmsg-5.2.14-0.7.30.34.1
php5-sysvsem-5.2.14-0.7.30.34.1
php5-sysvshm-5.2.14-0.7.30.34.1
php5-tokenizer-5.2.14-0.7.30.34.1
php5-wddx-5.2.14-0.7.30.34.1
php5-xmlreader-5.2.14-0.7.30.34.1
php5-xmlrpc-5.2.14-0.7.30.34.1
php5-xmlwriter-5.2.14-0.7.30.34.1
php5-xsl-5.2.14-0.7.30.34.1
php5-zip-5.2.14-0.7.30.34.1
php5-zlib-5.2.14-0.7.30.34.1
References:
http://support.novell.com/security/cve/CVE-2011-1072.html
http://support.novell.com/security/cve/CVE-2011-1466.html
http://support.novell.com/security/cve/CVE-2011-2202.html
http://support.novell.com/security/cve/CVE-2011-3182.html
http://support.novell.com/security/cve/CVE-2011-4153.html
http://support.novell.com/security/cve/CVE-2011-4566.html
http://support.novell.com/security/cve/CVE-2011-4885.html
http://support.novell.com/security/cve/CVE-2012-0057.html
http://support.novell.com/security/cve/CVE-2012-0781.html
http://support.novell.com/security/cve/CVE-2012-0788.html
http://support.novell.com/security/cve/CVE-2012-0789.html
http://support.novell.com/security/cve/CVE-2012-0807.html
http://support.novell.com/security/cve/CVE-2012-0830.html
http://support.novell.com/security/cve/CVE-2012-0831.html
https://bugzilla.novell.com/699711
https://bugzilla.novell.com/709549
https://bugzilla.novell.com/713652
https://bugzilla.novell.com/728671
https://bugzilla.novell.com/733590
https://bugzilla.novell.com/735613
https://bugzilla.novell.com/736169
https://bugzilla.novell.com/738221
https://bugzilla.novell.com/741520
https://bugzilla.novell.com/741859
https://bugzilla.novell.com/742273
https://bugzilla.novell.com/742806
https://bugzilla.novell.com/743308
https://bugzilla.novell.com/744966
https://bugzilla.novell.com/746661
https://bugzilla.novell.com/749111
http://download.novell.com/patch/finder/?keywords=778ae960c062031cb692b8c0c4a67400
More information about the sle-security-updates
mailing list