les critical ca dois etre pour ca ... je regarde ++ On Tue, Jan 31, 2012 at 4:26 PM, Thijs Kinkhorst <[email protected]> wrote:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-2399-2 [email protected] > http://www.debian.org/security/ Thijs Kinkhorst > January 31, 2012 http://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : php5 > Vulnerability : several > Problem type : remote > Debian-specific: no > CVE ID : CVE-2011-1938 CVE-2011-2483 CVE-2011-4566 CVE-2011-4885 > CVE-2012-0057 > > A regression was found in the fix for PHP's XSLT transformations > (CVE-2012-0057). Updated packages are now available to address this > regression. For reference, the original advisory text follows. > > Several vulnerabilities have been discovered in PHP, the web scripting > language. The Common Vulnerabilities and Exposures project identifies > the following issues: > > CVE-2011-1938 > > The UNIX socket handling allowed attackers to trigger a buffer overflow > via a long path name. > > CVE-2011-2483 > > The crypt_blowfish function did not properly handle 8-bit characters, > which made it easier for attackers to determine a cleartext password > by using knowledge of a password hash. > > CVE-2011-4566 > > When used on 32 bit platforms, the exif extension could be used to > trigger an integer overflow in the exif_process_IFD_TAG function > when processing a JPEG file. > > CVE-2011-4885 > > It was possible to trigger hash collisions predictably when parsing > form parameters, which allows remote attackers to cause a denial of > service by sending many crafted parameters. > > CVE-2012-0057 > > When applying a crafted XSLT transform, an attacker could write files > to arbitrary places in the filesystem. > > NOTE: the fix for CVE-2011-2483 required changing the behaviour of this > function: it is now incompatible with some old (wrongly) generated hashes > for passwords containing 8-bit characters. See the package NEWS entry > for details. This change has not been applied to the Lenny version of PHP. > > NOTE: at the time of release packages for some architectures are still > being built. They will be installed into the archive as soon as they > arrive. > > For the oldstable distribution (lenny), these problems have been fixed > in version 5.2.6.dfsg.1-1+lenny15. > > For the stable distribution (squeeze), these problems have been fixed > in version 5.3.3-7+squeeze6. > > For the testing distribution (wheezy) and unstable distribution (sid), > these problems have been fixed in version 5.3.9-1. > > We recommend that you upgrade your php5 packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: http://www.debian.org/security/ > > Mailing list: [email protected] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.11 (GNU/Linux) > > iQEcBAEBAgAGBQJPKAUcAAoJEOxfUAG2iX57Ct0IANOSodYkvOES0ARyuzHoj+wl > UJubCz4qt/FoUEQk8lmlmenH11Ny+W9bWNpzWuQXoOXGI9o10NNrV3+NtVeFsDZb > MpJEyrk9ES0kVlH9n2D7ajEz1BA550HGkdP8jJm+hCHb0gyBr/DaleVBpwBF/275 > NGVKaYouYYEUpiua1tqRuxGI8Csd3EidJBhexFzMMwsNDqnTJWBbr1Fs+YvFNJE/ > JcWLg8Dq/NJUfJNSJKVHBcA+v/CBSD1MXoqKyXdoHgdm7CrEIrT0kNvaZDLk8rN5 > yONK+SUZOu8ZNEWLaxJQZdogg6wEGqxAWte6n5KbqyOlC0melVvvrxJY8FWo8f0= > =CVzr > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to [email protected] > with a subject of "unsubscribe". Trouble? Contact > [email protected] > Archive: http://lists.debian.org/[email protected] > > -- Genre ;)

