-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: php4,php5
Announcement ID: SUSE-SA:2006:059
Date: Mon, 09 Oct 2006 16:00:00 +0000
Affected Products: Novell Linux POS 9
Open Enterprise Server
SLE SDK 10
SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SuSE Linux Enterprise Server 8
SuSE Linux Openexchange Server 4
SUSE LINUX Retail Solution 8
SuSE Linux School Server
SuSE Linux Standard Server 8
SUSE SLES 10
SUSE SLES 9
UnitedLinux 1.0
Vulnerability Type: remote code execution
Severity (1-10): 5
SUSE Default Package: no
Cross-References: CVE-2006-4625, CVE-2006-4812
Content of This Advisory:
1) Security Vulnerability Resolved:
php remote code execution
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- MozillaFirefox
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The ini_restore() method could be exploited to reset options such as
open_basedir when set via the web server config file to their default
value set in php.ini (CVE-2006-4625).
Additionally php5 on all products as well as php4 on SLES8 were
vulnerable to an integer overflow problem in the memory
allocation routine. This bug can be exploited to execute
arbitrary code with the uid of the web server (CVE-2006-4812).
Thanks to Stefan Esser for reporting the problem.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
None
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
to apply the update, replacing with the filename of the
downloaded RPM package.
x86 Platform:
SUSE LINUX 10.1:
f6dd03b1f84b776a939e58e38fd6c98f
b6159e3912b3bffb11fae6dab9500461
846328aa86a3f25b029e35b9d3840f63
c735136afd5c213ad6be4120fa43e3cb
fe82cff678a1fd1cea3b230e15d873d7
06cfb81e9a19bef52cc219896fa45ec2
ede772e0df37d4327c2dadeba9db1d5c
fe8226a18150a18cc47efd8e1e49545f
2eeaa4d328c1a88fb012a9c63d0f5737
c8d62c473ee38a740d82acbb01f2a604
9d7627b1aea3af75e4c5af1a6e0372a5
8115eb92b3097f7c3fe319c0e6c2ffc2
d1f160e50b916e50a8e8b52195d3fc72
49d2d0ae0c9c25d38b1eaa89865bcab4
45187b38a55b347ae84abb30d061a787
94b1cecfdfb18773641439cdf1668454
5574dc126d991fef2824a6acc8c0895a
89cc8ab51584491c7b39c78b4170bb29
ddeca03fd455c9c93a022c012abf55e3
89d3bfacf2abec0fbec695f69707e35d
0f2b0fc62b87ffd75e5f1cb21064a31f
4ea6ebd1396b33d23ffacf1e9599af02
1084a9ce72c2ed624949c65493db643c
SUSE LINUX 10.0:
fbc86de2aaa147b2d264ff831c831792
007e4de44bfa90eef1ff6567f78eba59
051943acb8ec58b129136f46c2ecd7ec
18ec3b046301279842e52fa6cd66fca0
246f6c4a6b6881228e608d46fbd1099d
cb567d9796c9c1ba7b17dfb14237f426
dbef703ac598b91a31c9cac4686eef0e
6f7fa5048ef406f1f5b8af256f1e1463
e4725eda81a38ad9b641435dca00f49e
e17da072c91687f6915c4025f6ce7726
1c403b9e2664f53d22888aa475c0e070
75207b60793aacc6fbf02ea735a361c0
dff3cdadd86ef5b3246624de0431c7f5
004b1818f4400fda0455eb8c84f6c1ed
9b2f246630ee84be56dd6f353fd8e977
e38a60b12642b056c15ec648668e2280
447c44c8407a6bf6988a14c5c27a1317
b1956139ea32d80efdfcffaf31b472ab
404f2abddd78e426c85d6c8158f93509
2b53b87602ea2f7ed6d64435e585a8fa
c75ada861608c401b7d0bc500942bc6d
63b11a345afdb21d271ce8c9dce17bd9
3ce164ecbe438e8620de4e7803a4e78c
77d42d51dadb0090b1e292439b50455b
9eeebde8bc4e14abfef2f63c0a3db8ad
5fe2bb60078bcf49492ff979a7d28dd2
9fdd80c3e3fb093a75c6490b44372570
5d3862a7c32c4c453f144396199670ad
81b4c50e2ea1b2efbb73849f199d8a26
c91721c527f771a939decb7d59d2a434
fe1b50e4e78b9c2ff7ca1ac28e4c0710
612f4fef9441665bc7f54fa7418fb8b6
7dea87fcc3b039e0cc93586fa9caa165
c14cfd7effda4029ad1432e20d1fe0e0
e9072bc3b473b76605cf0fd6c17690f1
SUSE LINUX 9.3:
cd05bada49ef9f07859502511c341bb8
4dc15ec9e03e0067d9e202ea2d5a30ae
1e68968d9f06b7994437863fb49a7a4e
5caf64b03ece7424f7bef8c979b57c52
dcb0476afba90ac91def03ce2004362c
61c11fadc92bf9ab06f739b292ecaf90
91ee711ce1de9ae7745c1d47c17f5824
4f595cd294012bd85bd944dde6611bd6
0c328a3d48c297175dffb70c4f4a1379
45888d95df7d3b0411eb20fb02ccd697
358aba830423e959cc07e2293dbc6980
c9ee751b2bc23a00a11fa07ae31f0026
cdbb946e43b95fd8ef85e624a4629f5b
5247aab4da119ddef1ebb435e5e832c6
9fd4c00263e6b63e01e090595ced8a2e
b0c884ad8505fc5a4ee4c4dee5d16bf2
50dedfe6107fa2653315a4aac13252c7
55a45c1bd646124bdf9f3eea2794b533
43d3508e975f10d231178e5e8b40dce1
f3db940945dd212f5a9b682a89215fa5
db078448d4d499c504246a32e44766ad
87efa23fc3ea41885f532a7de5de08fb
54397e6467a9591de6d07fd7098618af
3eed6c7c14538dbd373cfa90f2f96feb
9d49f8c56768433e8167c3adf9a300b2
477bb33a8184c3bd2de7d8a00a1b4c2d
ad9fc22af4586c67df7f7ba71073e625
d076b8ac94953b201fe272d78ef92ae5
6bfaa9d4a081f4acecff27b5e9246456
85d610f4f7e14b6bf12aef1c6f8ccc7f
74094b1bd45c23fc0a69c83e8d398810
77fd442e71d6b929849163fd35d1016b
cac6cfa6c6604782d5bcd0ad92a9e4f4
b988bbba4ffaefb424bdee98f6fb2218
882da0a0da11360fab0d1de9e17cbb6a
b431e4834365ce84bddec9f7b8a8b745
b1b83587ed9175f4bba12d64b14604c8
60a8483a2be8aa09f7e8e9b466e80c48
351c07f60fa51ba61f78fd90918a12b1
SUSE LINUX 9.2:
932db4aa97d47de823bbb8a60da6f01a
633090701852c58e7f7c8ddfd389260c
9b0fdc2c678b99e3cfb10256eccffaa8
bb3103aa6ecc1a5ea68e99b74cd68243
48c19eb0c5626afb0798248fb522b1e9
f33278e462354fb9417909933bdddd4c
4c63ef97386fa705aee8fd6bc0a34f1c
b20ce9f96b9a1d219f4284f9be1c6769
d3ce1978b63951b01dd71e239fc8c653
7acac40296c303c9d632f6b6049b52d0
ee35c61e9005d0e69350bf16d9911a97
18d4c3dde24ce92d9c801796008f426c
b3339967bf8ac7b5c73f0b477a4f86d6
afe0dccdecf19478671de8460fe192e5
65056f0fc08ce660782f67ed31f45cec
Power PC Platform:
SUSE LINUX 10.1:
403aa6a3deb4375b6f3209360b2b40c9
afc28dc756325d9032ffe5da24ff7410
33b26806735c57b80bb8f693dd686c1b
ed392e2bd40bb6e57d06f2924f871b28
20765547d47fc406c6c03437ff5233b6
b881aa56b9f2cda99b3544ca9090bcc6
7e4496e4ea7b782576e5cf5e81ecebc9
31b9f17cfffab798c5c8672fefd50552
00ca9a6da8ff6423a176310c66079f8b
0c18e1ac2ab1bc4af92a2a04608bac5d
fd137ee43ae350086fabc4dda8358363
d9eb6e8e7cb2ecd412d1d7d97a08f871
a14070473b79c34cabae4d7c422a0ca4
405440aeecce1f9e6db7edab2db94f07
0f05185c36c427984eb6fe03d658962f
df68e381e4bb8fc0a63b5295c518e2a2
6314ea97b0f8fe4f2df143d2a0490da0
c8527246e6af1b70798855caf9f9f835
77254262548be8ce2d57c0fe4c4a0bec
035b88ed045ddb9ed193ad99d0b4a821
40902c4ea299bc8c82b8072b4257282e
415b36426ded7fd11854b4f5cc1312c6
78dbaac509f06279442f74d55d6fbe28
SUSE LINUX 10.0:
92c467afc8499acd6741295592135d47
fd2b8d050fd0b965c97f570e1eead6e2
4aac71798b31f08294ea989ed12eec30
faded8e49ab6209fa8b47cc5e35f9d50
cad2ab1f4959c036206248401332e50f
fbe624caef506f028fea26829be304ea
dc70abf0de81d818b28bfa8c87973b22
9a33700522d2974894092582450662d2
fe5cec68785419e1f5a880cea4325205
64c9df252105971d2633d9c34bd8ffb7
14a5b886c3b88e0b55d7d29c6cf6528c
47fc29bd436e35c2e4484cb4ce053e7d
aa69f2d86554292e5cc33d1d71700386
e1ea0b3c94a48d60375ab75146640380
a9d838eeffc7552d1d8761b8adf925d5
fde53494b4d321b354dfefffe794041c
c5599db73f8ae5f89a6df48724eedc28
9cde256c6f0cbef1b3f12517dc48c116
4b48505b1ff76cc580d6e6f563bfd487
399abb278959362a131373091b7b6f08
beffccac7a7a8fd2772d2cf55e68cf50
b3ecb6c72b0c40c173e4ee5c0a8cd73e
a8fd23d05a1c7dc25ed2ba4a5f301611
c4fefff079301ebcca63a59ab1e0e153
13a4aa5e1bfdd2a5ad33e7fe744ca9ea
bbd7eb300ee9227adfbe93b8b69356e7
8903ff48cd8226ea717f0e8e97ce2b60
93da69c86dcf56364fc7143a9b609c75
1b64509a590d002849524cdd467b79e0
56fe5de931c142bcb8883a354e7071d3
96f40acb04fd6068d42dcb56b9ab89e0
61102c8134a1f779d082d99d3aa4d9e6
4d07e0dbcbd0febef91cdc9ff1c3ad57
7097dc036944f5561a26b7257428fbaf
x86-64 Platform:
SUSE LINUX 10.1:
c749607da1bc1a972e638d4370f2f35d
8e8082bf28dac11ee3d99178122d0368
699345521cd281e9b6019f00b2b86bb5
7b917378da6ff33446cef9adb4a74a6e
9746da6165ac4b857c070381c6750fe8
e056bb5c0ae649cbea5950314d3d5c1f
0c8f57d45f9149c054f8936aab135fd4
c34912e3616e6aa67af07b10f8d3f0cb
4be839015bd25b70851f2568795632b7
a862b4f752f2be0ae37eb3eb09e709cf
d4a3111a5faf259cd8030d4d1ee30183
3210a033fd82cfb3a9a33d20ff2d5b63
8f646fceffa1d7395055c8b8d91f441e
d5f607c88c9ec11d08fcf239fb98af91
546b07881b9268bab6eacbf83f381078
b5e9cdb4299ba235edfa5e2d33ccc359
8ea616e5a196a63a67a210134bbb4f68
b4e81b116ba21cd72e0c9f439a1d2f1c
026feb504831f32e2d34a33399616b62
0fda401e8867fcdfc7ff364ae76ee8b0
be0633d33c9c08baba83b82436c55ac5
6533d9d8acbc65856d7fbeef6dead46b
9cf9310441ffbd502d6439dc2d7de6b9
SUSE LINUX 10.0:
1e0de6a51def77aac177bce9d5e82b1b
8e1122f9fe744a1f03d6566fd6f93130
ddb89672b22e2b300fc7991c236b7db4
5414044cdda8fb4a7ae550151fd21cdf
50baf6b9757589519224c7a87572eb7c
98d938b23a28b90d3d099f02f3f2b6c4
7a4d0ed6213f52cc1a045e3fbb207f08
561e2a171e05fff93948ac16067b478d
7a1fdd00365891457d05d8bd0715c108
74bdcd4636cdae23ab0d6007eb0c8a69
2f2ce3fea7ca6ba5e32584419fb3fc41
3ca43e4bbfaaa59e344bb034b1190231
6cfcaf4311f1176b74cd77df4a9557a7
58d43be831da6ac171afa3c44633712b
12a56931c439fe28f41d143c7d46cf06
632e238add83943445527286ad2a4786
003b14cc6b68249847509ba343c2ae7e
5bff13f4271cf1b0c39a3c093137b3fd
08893a7b87a44dd7a58c568a66bde2fc
10e6adbef4230e1433663e66e76ab097
f726b6f72e2ba22ff2140d4d3369041e
b366024861fd8b449976e4cc3df2f5bf
24ce6fbfc7cfbdb0c32d5f0fcdbb83b4
21fa1feb4c1e92caf293b0a4d212f7e4
06641522ee0439da6478803f3164343e
58d37498fac28dd0b9d4acf11769cffe
0d3bfef80261caf193d0f87b19c5b7f7
28a9435f7292a94868c071b9bd5a12fc
c4775839ea0e3b6a4ca44e26847f2945
1b80b850f9f1df3cc8cdb81e86133040
c104825999f8576717ce03e6f9ce19ee
188457c92de4703458cc1124933dd0a4
8a3451cccafc2cc843b64bc860042e42
53f7615b8cb7d6cbe052884507f2f7b0
552f17b1e803ecdd2444598bb0b6f685
d26fd9c0b6f962bc8a9e3b7562c1290d
SUSE LINUX 9.3:
643f1e34da10a3bed2d1f9c1e4712538
efdeea1303dc872a40be3b87da46ad15
70ca20f6c1162bcf99aac25c91afc858
b6d3df5f0be0beb4b4c6c3fed43cef0e
c952654ac95199cedf6e864692769287
2f711da5b9a6cec7c5ede1ca9cab987f
ef7677be40f12c666c8cc64f9cc53f15
03097a89737b2d761db59956f3f2a84c
b3329ee06339347236804faacdda05fd
44eaf0ed40023787e2d4225b45493244
2d93762abd94bbe4d6a3915003808f82
b47f6a22a04b593651c2a4caf8193ddb
85f0b820820978a1f9ca9c4df8d6d6c8
a33d2d4ec99a423c3b04a879d871454f
c44f66156b0fa4e42539f97e6e3d07e2
8cf0b1691ae76361efee324ccf620bae
ab41eb2df74f43b2337f04b28b0ac636
d2f0e45577ba78bacb35b6b756c19921
75c441f0b1367f8fadb325f9e6a7d15f
a48a71f3e3868dfb06516aa55ef2d5a4
c29a4230f4b262db4722a48b8c275d1c
a63d4f4c97883ef4eb77220db27d9dbf
05e617f0bb42e7d91136e919816c23f6
ef857806b3a69116353805102fdc8bc3
1e24ec771dfaa282a53cc56b099c931f
2d828e49145419252f146eaee1f9bbd9
07f89108dfce4d2a11d1605ad9504db7
ca6b86f0a359b76c2d43c9d11ce0e28a
def26aa2782932d03212a32d2014ebef
7e2160498dea91361182cc9da7358603
323de649e6ca3caf0650986fb1589f6f
d415f8cd5b92d425187c8041ce124471
5dbfb8fb07bb68fdbc1c32a7bc2febf8
b53f94ba9fe43ec528dbd9a588d424bd
1cd948197a375bb6be6648863e1b8634
12b0ed1aa4abf7fecc50abb2f0515508
d56c7f2dfa51306646b19be686a51ec5
daef780694c53520262f443007455379
ebd520248c18d2cbf0f5809b20f8698f
318cac7311b10d8755a48e9fa3964b68
SUSE LINUX 9.2:
c2b8e562ff87dc6bce395a24ce3a9b47
2028fcf513906981769e27cc4949954c
a97865f41d9f9e706c2d2ae44edb7f55
a3c90067b86988feeffb8d8eee11ab8e
1f0e7435cd4392fe11774c220f3edd72
87c63bcb25656f5a6b5e20a47469fcba
3d49718bfd1a093a55bbfb0fb3d9d67e
e6651814510fccf90f4cc173dad1ef1a
69958c72bded1f197491cf3aca1543d8
dbd2ee8bb34c64858424cd7af03a6f11
edaec833274625b6d856be99fb9a20cd
9dde75c674d247bcc86262b326cfd453
85d4d54a73e9a7be57edc801b0265037
f3af7b261a32714e31d980581e9abed5
714bfc397e7de8d5c5d5ece6a0e5d6e0
8fd2ce4a48d75e9e87f829a7f1a5fe5f
Sources:
SUSE LINUX 10.1:
cc6bc61b1b20c8f0e9d5028fff7f6d24
SUSE LINUX 10.0:
f0517a98aa6a2e438ea1df08749526fb
479e3a8ce7006d0da2ff0cbc652a8820
SUSE LINUX 9.3:
78f103b7127ae5c1fa0721f8522109fb
c59645d70437725b056d757c50313e2c
SUSE LINUX 9.2:
17b174a8f31e0694ed22445e385b2b4b
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE SLES 10
http://support.novell.com/techcenter/psdb/f432b71f2a461b7fdaa41fe183b0cf96.html
SLE SDK 10
http://support.novell.com/techcenter/psdb/f432b71f2a461b7fdaa41fe183b0cf96.html
UnitedLinux 1.0
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
SuSE Linux Openexchange Server 4
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
SuSE Linux Enterprise Server 8
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
SuSE Linux Standard Server 8
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
SuSE Linux School Server
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
SUSE LINUX Retail Solution 8
http://support.novell.com/techcenter/psdb/f605f6450308ab2167b3807a3ec3f6e5.html
Open Enterprise Server
http://support.novell.com/techcenter/psdb/18ce0ef65eb3f8c4c6da71f27f4397cf.html
Novell Linux POS 9
http://support.novell.com/techcenter/psdb/18ce0ef65eb3f8c4c6da71f27f4397cf.html
SUSE SLES 9
http://support.novell.com/techcenter/psdb/18ce0ef65eb3f8c4c6da71f27f4397cf.html
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- MozillaFirefox
The previous MozillaFirefox update was erroneously compiled
with debug options enabled which caused slowdowns and excessive
amount of logging. Updated packages with disabled debug options
are now available.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
replacing with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team "
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
.
suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
.
For general information or the frequently asked questions (FAQ),
send mail to or
.
==================================================================== SUSE's security contact is or .
The public key is listed below.
====================================================================