[SECURITY] Fedora 13 Update: php-eaccelerator-0.9.6.1-2.fc13
updates at fedoraproject.org
updates at fedoraproject.org
Mon Aug 23 22:00:56 UTC 2010
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-11481
2010-07-27 01:38:47
--------------------------------------------------------------------------------
Name : php-eaccelerator
Product : Fedora 13
Version : 0.9.6.1
Release : 2.fc13
URL : http://eaccelerator.net/
Summary : PHP accelerator, optimizer, encoder and dynamic content cacher
Description :
eAccelerator is a further development of the MMCache PHP Accelerator & Encoder.
It increases performance of PHP scripts by caching them in compiled state, so
that the overhead of compiling is almost completely eliminated.
--------------------------------------------------------------------------------
Update Information:
Update to PHP 5.3.3 Security Enhancements and Fixes in PHP 5.3.3: * Rewrote
var_export() to use smart_str rather than output buffering, prevents data
disclosure if a fatal error occurs (CVE-2010-2531). * Fixed a possible resource
destruction issues in shm_put_var(). * Fixed a possible information leak
because of interruption of XOR operator. * Fixed a possible memory corruption
because of unexpected call-time pass by refernce and following memory clobbering
through callbacks. * Fixed a possible memory corruption in
ArrayObject::uasort(). * Fixed a possible memory corruption in parse_str(). *
Fixed a possible memory corruption in pack(). * Fixed a possible memory
corruption in substr_replace(). * Fixed a possible memory corruption in
addcslashes(). * Fixed a possible stack exhaustion inside fnmatch(). * Fixed a
possible dechunking filter buffer overflow. * Fixed a possible arbitrary memory
access inside sqlite extension. * Fixed string format validation inside phar
extension. * Fixed handling of session variable serialization on certain prefix
characters. * Fixed a NULL pointer dereference when processing invalid XML-RPC
requests (Fixes CVE-2010-0397, bug #51288). * Fixed SplObjectStorage
unserialization problems (CVE-2010-2225). * Fixed possible buffer overflows in
mysqlnd_list_fields, mysqlnd_change_user. * Fixed possible buffer overflows
when handling error packets in mysqlnd. Full upstream Changelog:
http://www.php.net/ChangeLog-5.php#5.3.3
--------------------------------------------------------------------------------
ChangeLog:
* Sun Aug 8 2010 Remi Collet <Fedora at FamilleCollet.com> - 1:0.9.6.1-2
- strong requires PHP version
- rebuild against php 5.3.3
* Sat Jul 3 2010 Remi Collet <Fedora at FamilleCollet.com> - 1:0.9.6.1-1
- update to 0.9.6.1
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #601897 - CVE-2010-2190 php: sensitive information disclosure (MOPS-2010-047, MOPS-2010-048)
https://bugzilla.redhat.com/show_bug.cgi?id=601897
[ 2 ] Bug #605641 - CVE-2010-2225 PHP unsafe unserialize() use flaw
https://bugzilla.redhat.com/show_bug.cgi?id=605641
[ 3 ] Bug #617180 - CVE-2010-1914 php Zend Engine: Information leaks, memory corruption by interrupting certain opcode handlers (MOPS-2010-014, MOPS-2010-015, MOPS-2010-016)
https://bugzilla.redhat.com/show_bug.cgi?id=617180
[ 4 ] Bug #617211 - CVE-2010-1915 php: Memory leaks, use-after-free by quoting regular expression characters (MOPS-2010-017)
https://bugzilla.redhat.com/show_bug.cgi?id=617211
[ 5 ] Bug #617232 - CVE-2010-1917 php: Local stack exhaustion by matching certain filenames against a pattern (MOPS-2010-021)
https://bugzilla.redhat.com/show_bug.cgi?id=617232
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php-eaccelerator' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list