OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 22-Jan-2003 14:31:39 Branch: HEAD Handle: 2003012213313800 Modified files: openpkg-web/security OpenPKG-SA-2003.005-php.txt Log: final polishing of PHP SA Summary: Revision Changes Path 1.2 +33 -26 openpkg-web/security/OpenPKG-SA-2003.005-php.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.005-php.txt ============================================================================ $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.005-php.txt --- openpkg-web/security/OpenPKG-SA-2003.005-php.txt 22 Jan 2003 13:01:32 -0000 1.1 +++ openpkg-web/security/OpenPKG-SA-2003.005-php.txt 22 Jan 2003 13:31:38 -0000 1.2 @@ -1,3 +1,6 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project @@ -6,36 +9,31 @@ OpenPKG-SA-2003.005 22-Jan-2003 ________________________________________________________________________ -Package: php +Package: php, apache Vulnerability: buffer overflow in "wordwrap" function OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= php-4.2.3-20020907 >= php-4.3.0-20021228 -OpenPKG 1.2 none >= php-4.3.0-1.2.0 + <= apache-1.3.27-20021129 >= apache-1.3.27-20021228 +OpenPKG 1.2 none N.A. OpenPKG 1.1 <= php-4.2.2-1.1.0 >= php-4.2.2-1.1.1 -OpenPKG 1.0 none >= php-4.0.6-1.0.1 - -Affected Releases: Dependent Packages: -OpenPKG CURRENT <= apache-1.3.27-20021129 >= apache-1.3.27-20021228 -OpenPKG 1.2 none >= apache-1.3.27-1.2.0 -OpenPKG 1.1 <= apache-1.3.26-1.1.2 >= apache-1.3.26-1.1.3 -OpenPKG 1.0 none >= apache-1.3.22-1.0.6 + <= apache-1.3.26-1.1.2 >= apache-1.3.26-1.1.3 +OpenPKG 1.0 none N.A. Description: - According to a bug report [0] from David F. Skoll - <[EMAIL PROTECTED]> a buffer overflow problem exists in the - "wordwrap" function of Personal HomePage (PHP) [1], a an HTML-embedded - scripting language. Thanks to David's input and help the source of the - problem was tracked down and corrected. The Common Vulnerabilities and - Exposures (CVE) project assigned the id CAN-2002-1396 [2] to the - problem. + According to a bug report [0] from David F. Skoll a buffer overflow + problem exists in the "wordwrap" function of Personal HomePage (PHP) + [1], a HTML-embedded scripting language. Thanks to Davids input and + help, the source of the problem was tracked down and corrected by + the vendor. The Common Vulnerabilities and Exposures (CVE) project + assigned the id CAN-2002-1396 [2] to the problem. - Please check whether you are affected by running "<prefix>/bin/rpm -q - php". If you have the "php" package installed and its version is + Please check whether you are affected by running "<prefix>/bin/rpm + -q php". If you have the "php" package installed and its version is affected (see above), we recommend that you immediately upgrade it (see Solution). [3][4] - + Also run "<prefix>/bin/rpm -qi apache". If you have the "apache" package installed having the "with_mod_php" option set to "yes" and its version is affected (see above), we recommend that you immediately @@ -43,8 +41,8 @@ Solution: Select the updated source RPM appropriate for your OpenPKG release - [5], fetch it from the OpenPKG FTP service [6] or a mirror - location, verify its integrity [7], build a corresponding binary RPM + [5][6], fetch it from the OpenPKG FTP service [7] or a mirror + location, verify its integrity [8], build a corresponding binary RPM from it [3] and update your OpenPKG installation by applying the binary RPM [4]. For the release OpenPKG 1.1, perform the following operations to permanently fix the security problem (for other releases @@ -54,14 +52,15 @@ ftp> bin ftp> cd release/1.1/UPD ftp> get php-4.2.2-1.1.1.src.rpm + ftp> get apache-1.3.26-1.1.3.src.rpm ftp> bye $ <prefix>/bin/rpm -v --checksig php-4.2.2-1.1.1.src.rpm + $ <prefix>/bin/rpm -v --checksig apache-1.3.26-1.1.3.src.rpm $ <prefix>/bin/rpm --rebuild php-4.2.2-1.1.1.src.rpm + $ <prefix>/bin/rpm --rebuild apache-1.3.26-1.1.3.src.rpm $ su - # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/php-4.2.2-1.1.1.*.rpm - - Additionally, we recommend that you rebuild and reinstall - all dependent packages (see above), if any, too. [3][4] + # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/apache-1.3.26-1.1.3.*.rpm ________________________________________________________________________ References: @@ -71,8 +70,9 @@ [3] http://www.openpkg.org/tutorial.html#regular-source [4] http://www.openpkg.org/tutorial.html#regular-binary [5] ftp://ftp.openpkg.org/release/1.1/UPD/php-4.2.2-1.1.1.src.rpm - [6] ftp://ftp.openpkg.org/release/1.1/UPD/ - [7] http://www.openpkg.org/security.html#signature + [6] ftp://ftp.openpkg.org/release/1.1/UPD/apache-1.3.26-1.1.3.src.rpm + [7] ftp://ftp.openpkg.org/release/1.1/UPD/ + [8] http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with @@ -84,3 +84,10 @@ the command "gpg --verify --keyserver keyserver.pgp.com". ________________________________________________________________________ +-----BEGIN PGP SIGNATURE----- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQE+Lp0igHWT4GPEy58RArl+AJ9/w1U0RwTAHxUooOo/OUpCx9yJagCg8KlV +yRQ54kIUxzdQn/bmmfpHZMo= +=9ZrR +-----END PGP SIGNATURE----- @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]