rPath Security Advisory: 2007-0242-1 Published: 2007-11-19 Products: rPath Appliance Platform Linux Service 1 rPath Linux 1
Rating: Minor Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: php5=conary.rpath.com@rpl:1/5.2.5-1-1 php5-cgi=conary.rpath.com@rpl:1/5.2.5-1-1 php5-mysql=conary.rpath.com@rpl:1/5.2.5-1-1 php5-pear=conary.rpath.com@rpl:1/5.2.5-1-1 php5-pgsql=conary.rpath.com@rpl:1/5.2.5-1-1 php5-soap=conary.rpath.com@rpl:1/5.2.5-1-1 php5-xsl=conary.rpath.com@rpl:1/5.2.5-1-1
rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1943
References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5899 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5900
Description: Previous versions of the php5 package contain multiple vulnerabilities, the most serious of which involve several Denial of Service attacks (application crashes and temporary application hangs). It is not currently known that these vulnerabilities can be exploited to execute malicious code.
In its default configuration, rPath Linux 1 does not install php5 and is thus not vulnerable; however, systems upon which php5 and an exposed application have been installed may be vulnerable.
Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html