rPSA-2007-0242-1 php5 php5-cgi php5-mysql php5-pear php5-pgsql php5-soap php5-xsl

2007-11-20T00:00:00
ID SECURITYVULNS:DOC:18461
Type securityvulns
Reporter Securityvulns
Modified 2007-11-20T00:00:00

Description

rPath Security Advisory: 2007-0242-1 Published: 2007-11-19 Products: rPath Appliance Platform Linux Service 1 rPath Linux 1

Rating: Minor Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: php5=conary.rpath.com@rpl:1/5.2.5-1-1 php5-cgi=conary.rpath.com@rpl:1/5.2.5-1-1 php5-mysql=conary.rpath.com@rpl:1/5.2.5-1-1 php5-pear=conary.rpath.com@rpl:1/5.2.5-1-1 php5-pgsql=conary.rpath.com@rpl:1/5.2.5-1-1 php5-soap=conary.rpath.com@rpl:1/5.2.5-1-1 php5-xsl=conary.rpath.com@rpl:1/5.2.5-1-1

rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1943

References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5899 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5900

Description: Previous versions of the php5 package contain multiple vulnerabilities, the most serious of which involve several Denial of Service attacks (application crashes and temporary application hangs). It is not currently known that these vulnerabilities can be exploited to execute malicious code.

In its default configuration, rPath Linux 1 does not install php5 and
is thus not vulnerable; however, systems upon which php5 and an exposed
application have been installed may be vulnerable.

http://wiki.rpath.com/Advisories:rPSA-2007-0242

Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html