-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: php4,php5
Announcement ID: SUSE-SA:2006:024
Date: Fri, 05 May 2006 16:00:00 +0000
Affected Products: SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SUSE LINUX 9.1
SuSE Linux Enterprise Server 8
SUSE SLES 9
UnitedLinux 1.0
Vulnerability Type: cross site scripting, information leak
Severity (1-10): 4
SUSE Default Package: no
Cross-References: CVE-2006-0996, CVE-2006-1014, CVE-2006-1015
CVE-2006-1490, CVE-2006-1494
Content of This Advisory:
1) Security Vulnerability Resolved:
various security problems in PHP
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update fixes the following security issues in the scripting languages
PHP4 and PHP5:
- copy() and tempnam() functions could bypass open_basedir restrictions (CVE-2006-1494)
- Cross-Site-Scripting (XSS) bug in phpinfo() (CVE-2006-0996)
- mb_send_mail() lacked safe_mode checks (CVE-2006-1014, CVE-2006-1015)
- html_entity_decode() could expose memory content (CVE-2006-1490)
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
You need to restart Apache if you are using PHP.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
to apply the update, replacing with the filename of the
downloaded RPM package.
x86 Platform:
SUSE LINUX 10.0:
6b6f828e6f733c9117677a3a234a6602
76fa73bd92c918aee8c2939a92738d91
36b6ed77eaf3e83c1a4ad0625e2073f4
3a3e763d075452614969450d3b86bd98
fc74bb5bdb43e25f5d66f91d04ce316e
28958c0a11482bc1d22cbbd6e848e74c
faab2290d9e7669d4a8d67beddf0e671
2285d7091733b3bc63d155fcaa778f6c
9acfc3c6dc0d6683b9a152a76a43b1bd
ab4af84024ceb74d70e919f9d09a870b
969af2b2544aeff9646ba36947b862e5
b9810d851586255c68e6b2331f34a4c3
3402e2214fd4507ca9aa5c980d75bcc2
ade4990d7c6993b9c3ba5f510c5fbab7
SUSE LINUX 9.3:
99ba46ea991c883808c304d07f33d249
0503aec4a5a82e1d9ae6192b222b290c
47600218946ad433fb6b6a9a6afcef0c
a2a9fc17e960178d2dbf23d8265f5585
418094d3b37d1c857289f931a87548fa
658e23a8c0bcad516c3b3fc1be25e6d7
07a2a44784204b7b52bc1d53354780e1
bff63a95a377eefeb0189c1d6f9a485b
98f4b344341405fb41280dda866f9e7c
5f524f73d17b41c0ea3456807db527fb
44996581cba4c895651525549e256e5b
f80e4cf90d5bb46356990dda3ec4927b
4e0d7297c74ec3b74ad714654ac317d3
c570418f792f46df575ee1c8a0415873
ddc40c5e0157cfd67b6c716c1e140741
4259d22f50ee8f738d00feadd58d715e
a49ec3d0bf89a9923d9d880d056349b3
7ef1e26d736769f55cc85383f602235b
1676e5b1827f3e92e2fe94f089839bce
SUSE LINUX 9.2:
8b953a2e17a6ee66c6a1c6046368e5f3
e473405f2070998d0c85ec0297bf8dc1
e2162c5888c88d822bda7f53ce596ebf
795f7a60d9597395d55eea6e6f9c8da1
734a256606551a24db1618988a963c46
8b1cc300f4b8aad99431c1c827758d31
da17518a45eaada3b62b828920f156ae
796f1b0355769a86eb38011d73db12e4
e1b25defbee61446c0b97738ea0a247d
a3c2c81cc6d824559e42fe5e2328ea96
SUSE LINUX 9.1:
87f721efec2666616b2a47b4944925c5
3612c8ee8d5b46bca8b8ad1d425b7390
fe7b6eca56264f9d3d8e90b3692be7ff
f7f2111848c814cefe02eb970a1721a6
5b3bd9b8e92549fd4173d1d3252f14cd
82f388d3466061f88662683ec0ba1827
6edcf094f473d2a41c9a837ffa756d92
df6780b7209a64e48a015b53bdaa547e
f6e4492bff66b7222b331ba9e4c5146c
ce084327411ff832ad9be66055dfd018
5dee77c752b7025748ed3b4d9315e334
c9931577245fd8510a8e9b2f4f653485
02799222b008aa9063955163c0fbbef6
c002459202d21a3383bb35d8ff67b9f4
a2748a58b350220eee2645a8e379547c
77deabd27e0dad24378360f611bf06f8
Power PC Platform:
SUSE LINUX 10.0:
7df2a11e69ffa419d8d5c146d28e15b1
a2b63bd747c7ff2862db5d42ebb2bbd8
2a5f8df9ee2ba5cc6880b2c1d34e714f
c0a367f322c13143cb47187c8cc8bc4f
11e51e126b6df00bbc6c0dd6166301bb
7cb52aca3f2e918696b00c4879d30c6d
6fdd0aee8d829b40377ab09506691608
d9e48c0c687936a966e4c3094b2b4f9a
7fd2ac5e7e827499e4761f39364b61e8
54242526d9b07eaa33dc43f48b820282
4ac04e6e553ce3c17d946646936ae474
65c1fc26bcf3f6fd4c86b8c9ac5b8ba4
a9f8414e2432c10a4b423febd12ccf1b
x86-64 Platform:
SUSE LINUX 10.0:
617475e9e1963f324740a83d70dd2ef7
a22ecddb37b4841fd876142984391e30
d3499d403c728e0043c9fe7a2a1b424f
06995df3092c21296dc9836df2727def
916cc2e79fb07f83b1b07190eaed8ad8
81199e8eb4102d0c87fb156b6d6a2e91
dbb0b9d569f6c0211af1cebcd3841dbe
6a2a784627b7c9eaaa7aa30c8b50eb81
e12d1e40671cc0b39c4d6ccee7b9ef14
48f214e79fac0718f2683d08dba26231
581c2d0e3b52f9a38894e1498b310821
dce87385ad055b5c7def9ee8a6ec6dc9
083b68a179a80bce514aed7505af1d95
c8b17caf10bf778058ef88c839fb1bd4
73b94de50d9ae4c5422f02c7bc99ed9e
SUSE LINUX 9.3:
9b85ffb1a64a9afe5a1e1c2e18080562
98ef8c6846f5f797941b8e65325c3bed
44a631428524605a97738989ce42aefb
6d28c436645446cd82b990e2b48d4d09
623e7716648d0f297a78ba448024abad
da7cc5983d692f4d04c25823eb9937bb
596f79e9efb92a9f29a79592160bd51c
ba6055ce00cd78fd15baf6037336710c
f18da13e175b0e7f8e81cbb3a6a413f0
d922fc060d5528466c427e39e39881d1
e734683eb5d103cd68e6ae3ace097f4a
4511ffc2f95268072a3636cdadb1d415
862c151fb18d5a836922a9653bebfaee
2b2d3ceced4156b9e1a78fa6f13e1b1f
2d040ba5d92ba2007998c838066ee9c1
0f3689dc6762f7381864315561eb5abd
19081faac05ba9cdf80cde99d8b43091
25493b06753bd7f26af2160e3d7e120f
d29c1c11a2ff543c73ddaa5f8dd80557
cb02362e2b5cc4e9c7e9ef8d374c8bb9
SUSE LINUX 9.2:
8732f4bcdae93f8cea7d368e012745df
dcb395ac52b140f7355610f509314e1d
c05b7dc8b4ebe44fde9b791dfcf56717
95075efcbda482a269559991a32be566
fa48339738e2d5439f618e9540e33cfb
56c5d6541e5d5f5ea1b151c20c7f7bec
b044ce117a68d3f78ed379405fce200c
44d285be830a99eecb782b4a12a250ba
e51cc1ecbd9d156d6934dcbb179d2660
046981702dd16b444669874ed557627a
69a868e5262a94638ed59890b2fd824b
SUSE LINUX 9.1:
a2b008f7e72ca4bd56fed705957e2646
a6e18c5af1bc830d6fbb843b085f6202
1332a3720198a22c18dacac4a7bddaff
2e8f6be0568855df432f17504295e0af
139a70888ff4e58f3fc35dccda0283bf
3aba9aeb421172074ad58593bf685f38
8b79b81aa4eb8796a4ab1061c3a0d148
f0f6b1662f9c8e131835642a5e4162c3
6b650204f8c4c4b4fc8b904240c9d80f
5ed97fa003f672ec905f9b4cf79cb75d
097dde03d49f21377f9dfffa95b269ae
bca76c3108beb3154a8bc7b0549f6af4
2037e5a699a856b58a0c51f81af7b02b
e8124a04e304ce665389ba1aab05be9a
df48ad0c0324e6f894cf75d72c7b2f00
e84fdb5f8f74586cf0f3c9618630648d
Sources:
SUSE LINUX 10.0:
2e8d3ddf53c6d89ee1d266a8d3fe81c1
97415f55701b39fc5502e3ad831e2987
SUSE LINUX 9.3:
3d7992db3f9cef46e73be3618a5dd02b
fb589c97d0c50c630fabd6653224010c
SUSE LINUX 9.2:
0e206f224cb742f6a9eee278535af277
SUSE LINUX 9.1:
fad2b28eab018eb532b3bc666a841914
18c1e7eaba11bf82399f862bb90b721d
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE CORE 9 for Itanium Processor Family
SUSE SLES 9
UnitedLinux 1.0
SuSE Linux Enterprise Server 8
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
replacing with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team "
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
.
suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
.
For general information or the frequently asked questions (FAQ),
send mail to or
.
==================================================================== SUSE's security contact is or .
The public key is listed below.
====================================================================