[SECURITY] Fedora 15 Update: php-5.3.8-1.fc15

updates at fedoraproject.org updates at fedoraproject.org
Sun Sep 18 23:00:38 UTC 2011

Fedora Update Notification
2011-08-26 18:28:28

Name        : php
Product     : Fedora 15
Version     : 5.3.8
Release     : 1.fc15
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module which adds support for the PHP
language to Apache HTTP Server.

Update Information:

Security Enhancements and Fixes:

* Updated crypt_blowfish to 1.2. (CVE-2011-2483)
* Fixed crash in error_log(). Reported by Mateusz Kocielski
* Fixed buffer overflow on overlog salt in crypt().
* Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)
* Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)
* Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)

Upstream announce for 5.3.8: http://www.php.net/archive/2011.php#id2011-08-23-1
Upstream announce for 5.3.7: http://www.php.net/archive/2011.php#id2011-08-18-1

Full Changelog: http://www.php.net/ChangeLog-5.php#5.3.8


* Tue Aug 23 2011 Remi Collet <remi at fedoraproject.org> 5.3.8-1
- update to 5.3.8
* Thu Aug 18 2011 Remi Collet <remi at fedoraproject.org> 5.3.7-1
- update to 5.3.7
- enable mhash extension (emulated by hash extension)

  [ 1 ] Bug #715025 - CVE-2011-2483 crypt_blowfish: 8-bit character mishandling allows different password pairs to produce the same hash
  [ 2 ] Bug #713194 - CVE-2011-2202 php: file path injection vulnerability in RFC1867 file upload filename
  [ 3 ] Bug #709067 - CVE-2011-1938 php: stack-based buffer overflow in socket_connect()
  [ 4 ] Bug #688958 - CVE-2011-1148 php: use-after-free vulnerability in substr_replace()
  [ 5 ] Bug #732516 - CVE-2011-3182 PHP multiple NULL pointer dereferences

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list