-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: php4,php5
Announcement ID: SUSE-SA:2006:067
Date: Wed, 15 Nov 2006 13:00:00 +0000
Affected Products: Novell Linux POS 9
Open Enterprise Server
SLE SDK 10
SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SuSE Linux Enterprise Server 8
SuSE Linux Openexchange Server 4
SUSE LINUX Retail Solution 8
SuSE Linux School Server
SuSE Linux Standard Server 8
SUSE SLES 10
SUSE SLES 9
UnitedLinux 1.0
Vulnerability Type: remote code execution
Severity (1-10): 5
SUSE Default Package: no
Cross-References: CVE-2006-5465
Content of This Advisory:
1) Security Vulnerability Resolved:
htmlentities/htmlspecialchars security problem
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update fixes the following security problems in the PHP scripting language:
- CVE-2006-5465: Various buffer overflows in htmlentities /
htmlspecialchars internal routines could be used to crash the
PHP interpreter or potentially execute code, depending on the PHP
application used.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Apache after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
to apply the update, replacing with the filename of the
downloaded RPM package.
x86 Platform:
SUSE LINUX 10.1:
e57faa80b680e8b814b453c00d6056e0
0d3e0e486207b46738fef33974ea756f
a5dd93bdd188f701d177f332c0a55500
9e93b00f0216801359a1ed324a65d0fd
aa15b807cd189e88b7f30a7cd9c744db
ba6c9a988609fcce31c3afc4ba9c9e60
5bad8ee3d16b064fc5efd84dd64b0838
d8010101b12dee6e55d5b14f9c463940
603ad80865068613d5c00aa75c105795
7693420c2bb38649715f4ebf13b750a0
897159ca99eab83235d1398010655fdf
50b9393db3bb04d196b5da76f27527b3
84fa47af4e3b15b2467f63c57b6bcfe6
95ed616dbd9e7540ad1744434907960c
68994bcb46af786aca3fd888bc815722
b61972de0f3213f3037ce37a5b897be7
aae68afa2af2d0d4fcce18daf0639df7
41e2c224dd1ac7b6f66a7e745931b000
02364d8f8a53b0a54bb7042f4ab67970
dc869ef20138b5b02a305f7c18213652
aab3d499075097d4b6833a62180a8d1d
9677f236aca423ff36bf5b00863abb47
be37a78bcd35b9eedc708dd110bd99bf
SUSE LINUX 10.0:
3897b132d043814a1c8e43f6139fee76
543c37978b77cfd044b71737962fcd2c
4c7df6649be25c769fc9d2da2b581c84
1d7ac601f57464c640185e485fd37d5f
99dcbc288737fd7c4e42c2021f7b73f1
81c7d67483b221902ab2d503f3818bae
b14e808651633396dc7e49867e904b88
0ea0c71655f4a820c04b67aa76dcc86f
c73c1d12eccdf9a7f297d7db09bbc715
67e12d875134f977a2a58b1432b66a21
e6bd99bf67bcaf237ff9c97b99a41e09
0699887baee8cd9b1ec6cffb4b26f242
6b803ad945a8198d61dafbac651d648a
5dfe0505a4d5f18e1263e04398847336
357376a0ab799df8099c01c0413c7676
cdbbb45a419cf429fbfcdbbd38c199bf
7d8a61934f86b61cc616d0050d1ec229
b44753f46245e6a07d4862a35c9e84c4
692f6171237488467b6a02ebf1b8d580
bc9920e010e991e33dea51a006a850d0
316275142505124fd5a2efe5b6520448
4e198a40b6cfcd2ddffa1c323c7accc5
7d6aa289c517c4b079242141b27e6fa3
44f7cf2fbb12dd41c984b4acd762363e
019dc26777503bdc6a26afb9c6b7787f
982f745d157a6d836cdb3367ce74bad0
66e5aa36f470cd62364593e9b0e13cb0
41f1187c34074c970df8c91e42dbcb00
884911ef2a69326b85ee5708c5acced5
d5a05f13e1f07c5d831d46a9b012addd
62ef54bf00690560663f83e7b6a1c9b5
6805d9a45fa2c786871c9400da85fa8f
120e893030fd3e12254a71bdbbc68270
4bc2252ca0c8028fbd7a9c56f141866e
ede8c82fcf65472a2a210d47ac6d72ef
SUSE LINUX 9.3:
bb37ace522b4b247390a7d2fd343fc2a
9f0444505823bab0e457b2eee503866b
17c64ffd909692f981df6333cbbb955d
eaa0781c6629df13434fc4e6029a5ec9
fd7815b14025ede01b0827fa4115a39b
1732cfe246bda05fc0f23878550f36e0
55ce1169fa5c9708e5b95e37e2523817
ee9d8d6b2a4686b4dcec90de9a16d3f4
c87cc42a8fd2b5d3196efeb23ce0aa7b
dccf0660b072c7e5cb05b5c3cbbc46df
eb2f95bed73b5331ce0580a9ffff83ee
c2f18db717d1b8d6b00959d7016fd794
94182fd233a1679ce6041a2b345df264
188028fdd1b848bd4ae78e599a29ea0b
49b9f294d486ef7b484162f498544648
3821484ea933a0b219e3355ec5f27267
66629a2e3f6a7169d78f02bf80ca768a
8002c9d4569a7912e1fe99acb9a1a9fd
003e4c98e666d8630a4833e82f54c094
819e085ff04cd8dfd68bf48bd634ac80
6e7fad4cf64d3af432c17cffb4afe53f
e195afa01a59ea612d4c351d623c6f07
644f800c519219ac22a5fd891c28e9f3
ad73d2a39e03d592b40faf62b83bae5a
64133e5d6bb271fae04157a971ba5e7e
8ced63cb7f9515df21f6d75603c88a20
1b0dc063ee1ab5498eee7fa24ffd2333
5d9f4b27cc1acc61c6e2458bf5e855db
64aec2679c4e6f2d92d8ef83c9297afc
96caffd7d8065013cba3757a600a013d
f98a7b2347844a10ec579adcaac6cffb
066a093ad825d0f21c57db9af739828e
d7c45643721143767c27e78978b5c009
281b03ecdaee24d10a66e17c321d1d7e
956125aff1b6235de761216f8b0ac3f2
2c8eadd0a14e89d36092a4dac12637b0
f59ebf805fcdb12197332adbf6170428
597e0ada90ad127e2e93fb2bd2dd86e7
5782f46660584961b864d82504169f1f
Power PC Platform:
SUSE LINUX 10.1:
5c3a7490baf29e40af9fe2c971805d02
a880773b9488ef82c8bb82a0f8d64c2c
89619e16cdf1a2b2dbf9244e80c3cf7c
63ccc700c51c27917f807bea38cff534
c1a5dbaf241fbec03da3c1ef9d349a34
61e718029e2a12d78c197f7e728fc152
77600cb98af2227a88e6e7ce700e142e
9f791a6cb12aaffcd0bd4a24fa6c8511
5420eeb95db2c6ffbf711edefcb86f52
20236329aea2add5d1cf4763ababec36
ee6af188441aef34e0c8bbe45b50da49
8bcecc900683d37aeb634e3b1a1010fd
9d638ddce967a3eb68a9463172d06997
343457755b73a1bcc99fa6e88e29e9f3
554cb0e394d142db3d62344cdd1c3c90
7194677f6fa9278d0a41a2b984128f27
38199b3a107c8e6bafd6d8a98328d6ca
3b875741eaf749e5b7de88191dea32d7
286c52d8e775f6ff53126f2f8d6fa374
ba171044ac3d74b24bfbc8cb44cd1ae1
25397498ac1e37d5ebbe4637b045e815
81939a0dddc8231c770209c31c93da1b
e4644d303ab5b33091491e04b9dfe733
SUSE LINUX 10.0:
d404506a09bd562e1f7b87f6f221ab1a
f6739e7e780cbf3ce4aad072c25b6dfd
0a52fbe377b254093666edcee6301ecf
efab9fd837dc2a9e5dede5896f8b2b5e
7cc6c67091b82390e32f3abc6ff7f476
06e05a03648245f56140aca7a77434f7
8188b67aef4d2e09a6a3179bac6fa39f
daa6610ac8740e46f932451f15460215
258a9ea50a76c6f80e247c2fe7a191c7
cdd1e67afc23c92e182c8238acc7acbb
9d9a03a033d30aab7645c6ca7bf91fdc
6f25188aec42f75e5b7c6ea7db1d9624
ea11aa7202c1b2917baf25763c8c536d
f8e8c682fc2cee7f43f2041f3fe2171d
ab488088003f0f10767ccbeae3863f10
94c108542cbba53077083fad6ed6e229
0c5ed8bd0070c5adfdd99d326ee0317d
78726d6e058fa0a13e6a819f5d5e778f
580a53f563a25992dfa347b97a6b013f
1bd5e9f4f120243fb774beae7145888f
f6d4e0bcd096c9d9f4d70d50f45e7030
8492aec117ee3148fbe1c3eaded1a467
0477685cc29f90ae22ab5874d9271949
7852ec943ea7701b7a02885707c71690
f900227644985f54a7599d86cf1e58ff
7a1a0479746fe9e2b912fda755548265
209858e52b723b928445be3f7d399c82
a4485ab476f08cc68b896e9946d9a7ae
64d70ed3ed35940336e2c77199fa2aa1
01e27cc86e2b3565788e573bf8aec191
c0acf6c7b3d917ec14d5b6af6794edb6
692dee19cd40eafdc3b349c8afad2997
e42dbdb0ab48b392e03014ddaf04fd40
e40ba04a3c5c597926ac379ff318dfbb
x86-64 Platform:
SUSE LINUX 10.1:
2d8a739b4cecd9882d0eb082b6a69348
7b1e56bff005296875899b9147fad095
9dc6cb876887bdb8127e153d0d555dcd
a4a5903adf9454a9029a2ea35a8dc79b
1adc8547eac04fe1672c0290291683fb
fd5aca9e425470708b2af5fa5b6a990e
f0b2064b6e8bf9643dbac2a2ee9b071b
997a8e793509037bf280e45c4fd9ae13
479d255df50e028189f9479970e3e0bf
2144c76e88b3edab24bd13331f6c311b
8f94ad01f7adbf6afe7aea6cd187d412
e103468c9c41cfe6c47998b8eb3f8814
f0b15d3f0452d04172e061a70654252f
1bf1cecddbfe202bfff5bd8065395f7b
77c78f652f8f06d2f548a23a614e3bc8
0124292c4136557838f59e340e3af27d
1d9bf118798dc9a0e17e06d92c67e22f
ae7e99e94409a4f9ef5b7d670ba1cc43
7272c2eac3a3a9085fba56b12e433847
6f9d55833b21afd381662d6ebfb2f65d
3d163f1c82ed1f014ce5a3242abaee5a
78a7da3d4ac63cbef4233e937cfc1f11
47a63db62d0bd26e4ad2454a27766540
SUSE LINUX 10.0:
0ab300b70b02d407460212633859d3e0
638ac9911ab2353d1644f3ea3f58c5dc
b3189fd4e0c577a4caf26ef3d88f3e2d
ceb7c679a3ff01072317cf7389e87e86
52cf201fc735a69ec7330a1cc90f4234
4c58e2303b7d497e103ad9d32f33c595
9cf2ea8f7d1e57d4ac0db96ecaae389b
8277d4cab2a14efdec945e6ce52e95bf
cd9b4bf7369542894d50b60acd872d05
b2dc740f8957d92bf8cf9896fdd879e6
8f6b9a6f62ff68ac7f41330d6944c761
2b7677cae8889cd37877b4f1bc0b8844
428972817272275762d79b98aeeb1df1
6edf5413bd4bc80114ae74fed3ac1c3c
76c9ef628b3b0776436acb83481f4bf1
3615d54dcf93c1ef8c3774f06d68c8e5
8e3a1441c72d898e3de57ebb84af2e54
cafd4690d9c5cab791740efc477e0e23
4d6ded62957dccd7866312cdb0bd9733
936d8f4587a9a5cde6b320fa93801d71
6d583a65c2583dbbd331b8e6cb00219b
b0df688b3532deed5a09feb59f8ba835
e8f4d15ee2799b03e90f8ef0d914b064
1913a4296358c2e592d0dea24c8e9aa7
a608e0006a05576bfc45c9eab6a741d4
cd65092005de210d3fe88bcfdd3df2a7
9443711bec8934b98f02be8b9812c050
b547531405f519c8b502719769897fe5
4d3ae6e0dca36aa033034c89154aa95c
977b2b53902f03178fa0425974f3a44c
3fdc56c1aaabc314442d7bfdc357d296
4a39f64d161ce79cc6b43fc9b824b873
a4e422e868287e01cdcd73e05d312dc8
6064cf384345100b2003b5d1642fa7ec
3abaeee3b57b267de2d1f9465039a2db
66ea3018704c30fe88fb2d8f98dc2032
SUSE LINUX 9.3:
87467db93691b6ba7a35c5b1813f4cb0
0de39de077ae0df7c42c0713c8fcdda0
a42f7164b0e676c9c04bab00f376c8f7
071099f308973b93bdf5bf0684fadf03
dd1090efe44a5c39a4d37e84619991d7
0b7a436030ba91f390db2d5fda87948f
a7362d9e9861b0440e69ac728e04dfcb
a9fe3ff55c9ce5181ce11ca4d69fcafe
2c1137b4793f0deb54e1d48974b8049d
9fb2a974b61581fc337c73423f761fa5
87f0c2940065d61b55abdaf08284d8e3
a0226dcc68681b3b2aef4a499c06e6e5
5d57c4bf164fdaba6e4eae308b07e716
1ff1450d5917aa89c9531829dbdbd64b
6e4bd961bd52ffc1c9aca58be9be3780
e27199d83837d59b76cfb1305f466230
5e9445198d0d7bb43e23f7d889c46268
7be9597720a390d414481d9630b97176
218a4f1a61f5073c0af5b7225f70762d
a103af05a4941936d575c0429fb76798
a8919a941dc32a3743c798b4bb00fbd3
65bde3ea9e0435178aed6f2c3eb6cc8e
6fb7f1331283ca7c3bc37ec5058afea2
94404361d39de30930136e637184a05a
344fcd4f499331d06c4692a82232d276
9f7f87e14866a9bcf3f13c49c6a173f9
ab1b7ae7aebae896f2dd211d1763dfc1
f5cd1145b6252cb467e8a50c1c27520d
ae8ba21ba946c489b6d74a96b4c09d93
48b02728261eb7c44a55eb07717f2fd2
32b81d5e55aa4bcdaf08a3103ca1a5cc
0dafcda7b4dc9a69a31a6d91face802d
92f545d335d7eb0527c8c9cb10827d27
056280dea69e55cf858bc153646e3ee4
4998c6ff01a4c81e6fd34825adf9c6b4
ae481915b9f32f134f33e00bd37c9c36
92026592609fa5e801346f0c68c794ab
ca96913fbe26855107b6627b643ec9b2
1de32e83cf551fe35fe58a0d9ff89437
5a1150fe6f80c6246194184e025187bf
Sources:
SUSE LINUX 10.1:
955dd593b249671b49c0468a801fc40f
SUSE LINUX 10.0:
5f61fde7f4967668ebc09c5420c2121d
f5aad91ffaaba5cbaa43f0e321b2ef1f
SUSE LINUX 9.3:
3e00697cb7dfff72f03eb4e36ff4308c
fbfd0640c942ea0fcaf623cd48d03dfa
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE SLES 10
http://support.novell.com/techcenter/psdb/95aa269a50d6438793d154b7db556119.html
http://support.novell.com/techcenter/psdb/95aa269a50d6438793d154b7db556119.html
Open Enterprise Server
Novell Linux POS 9
SUSE SLES 9
http://support.novell.com/techcenter/psdb/2a0a69ad2fa154c13d238e3177db3736.html
UnitedLinux 1.0
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8
SuSE Linux Standard Server 8
SuSE Linux School Server
SUSE LINUX Retail Solution 8
http://support.novell.com/techcenter/psdb/7ff98a5ba0483fdee45151d8d34c3d7b.html
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
replacing with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team "
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
.
suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
.
For general information or the frequently asked questions (FAQ),
send mail to or
.
==================================================================== SUSE's security contact is or .
The public key is listed below.
====================================================================