-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  php (SSA:2013-161-01)

New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,
14.0, and -current to fix a security issue.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/php-5.4.16-i486-1_slack14.0.txz:  Upgraded.
  This is a bugfix release.  It also fixes a security issue -- a heap-based
  overflow in the quoted_printable_encode() function, which could be used by
  a remote attacker to crash PHP or execute code as the 'apache' user.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 12.1:

Updated package for Slackware 12.2:

Updated package for Slackware 13.0:

Updated package for Slackware x86_64 13.0:

Updated package for Slackware 13.1:

Updated package for Slackware x86_64 13.1:

Updated package for Slackware 13.37:

Updated package for Slackware x86_64 13.37:

Updated package for Slackware 14.0:

Updated package for Slackware x86_64 14.0:

Updated package for Slackware -current:

Updated package for Slackware x86_64 -current:


MD5 signatures:
+-------------+

Slackware 12.1 package:
3e5af1a00cc18cd6545e605e255efc67  php-5.3.26-i486-1_slack12.1.tgz

Slackware 12.2 package:
a75b7ab86d9bbff99d64cf1f4931c589  php-5.3.26-i486-1_slack12.2.tgz

Slackware 13.0 package:
1783ec6a10cdef944d6b5feb60f11805  php-5.3.26-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
261d15d71eb1511fe76adca78bf9f688  php-5.3.26-x86_64-1_slack13.0.txz

Slackware 13.1 package:
bbfea2c007af80f60855790253ae8a4c  php-5.3.26-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
4a66118a2b9cf8753bbe9417079f6bf1  php-5.3.26-x86_64-1_slack13.1.txz

Slackware 13.37 package:
2848b87f9e5af6e65323d26ea18c5ab6  php-5.3.26-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
2bdc93156be85466131ff6b1735b39ed  php-5.3.26-x86_64-1_slack13.37.txz

Slackware 14.0 package:
4b1d89bdc7eaf8657643b713847f4dd6  php-5.4.16-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4e1514ec28b2784f9df5e4804071385b  php-5.4.16-x86_64-1_slack14.0.txz

Slackware -current package:
6d251fcb0f7bfa5fdac78eb7f143b986  n/php-5.4.16-i486-1.txz

Slackware x86_64 -current package:
85b55c7bc9f42304b13fdd88cab43a7e  n/php-5.4.16-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg php-5.4.16-i486-1_slack14.0.txz

Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware: 2013-161-01: php Security Update

June 11, 2013
New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue

Summary

Here are the details from the Slackware 14.0 ChangeLog: patches/packages/php-5.4.16-i486-1_slack14.0.txz: Upgraded. This is a bugfix release. It also fixes a security issue -- a heap-based overflow in the quoted_printable_encode() function, which could be used by a remote attacker to crash PHP or execute code as the 'apache' user. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 12.1:
Updated package for Slackware 12.2:
Updated package for Slackware 13.0:
Updated package for Slackware x86_64 13.0:
Updated package for Slackware 13.1:
Updated package for Slackware x86_64 13.1:
Updated package for Slackware 13.37:
Updated package for Slackware x86_64 13.37:
Updated package for Slackware 14.0:
Updated package for Slackware x86_64 14.0:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:

MD5 Signatures

Slackware 12.1 package: 3e5af1a00cc18cd6545e605e255efc67 php-5.3.26-i486-1_slack12.1.tgz
Slackware 12.2 package: a75b7ab86d9bbff99d64cf1f4931c589 php-5.3.26-i486-1_slack12.2.tgz
Slackware 13.0 package: 1783ec6a10cdef944d6b5feb60f11805 php-5.3.26-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 261d15d71eb1511fe76adca78bf9f688 php-5.3.26-x86_64-1_slack13.0.txz
Slackware 13.1 package: bbfea2c007af80f60855790253ae8a4c php-5.3.26-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 4a66118a2b9cf8753bbe9417079f6bf1 php-5.3.26-x86_64-1_slack13.1.txz
Slackware 13.37 package: 2848b87f9e5af6e65323d26ea18c5ab6 php-5.3.26-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 2bdc93156be85466131ff6b1735b39ed php-5.3.26-x86_64-1_slack13.37.txz
Slackware 14.0 package: 4b1d89bdc7eaf8657643b713847f4dd6 php-5.4.16-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 4e1514ec28b2784f9df5e4804071385b php-5.4.16-x86_64-1_slack14.0.txz
Slackware -current package: 6d251fcb0f7bfa5fdac78eb7f143b986 n/php-5.4.16-i486-1.txz
Slackware x86_64 -current package: 85b55c7bc9f42304b13fdd88cab43a7e n/php-5.4.16-x86_64-1.txz

Severity
[slackware-security] php (SSA:2013-161-01)
New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg php-5.4.16-i486-1_slack14.0.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start

Related News