Risks
Advisories
Browse
or
or
Slackware Security Advisory - php (SSA:2013-081-01)
[slackware-security]  php (SSA:2013-081-01)

New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,
14.0, and -current to fix security issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/php-5.4.13-i486-1_slack14.0.txz:  Upgraded.
  This release fixes two security issues in SOAP:
  Added check that soap.wsdl_cache_dir conforms to open_basedir.
  Disabled external entities loading.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/php-5.3.23-i486
-1_slack12.1.tgz

Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/php-5.3.23-i486
-1_slack12.2.tgz

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/php-5.3.23-i486
-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/php-5.3.23-x8
6_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/php-5.3.23-i486
-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/php-5.3.23-x8
6_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/php-5.3.23-i48
6-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/php-5.3.23-x
86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.13-i486
-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.13-x8
6_64-1_slack14.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.13-i486-1
.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.13-x8
6_64-1.txz


MD5 signatures:
+-------------+

Slackware 12.1 package:
5a254080f3b91fbb01fc661e404dd2b1  php-5.3.23-i486-1_slack12.1.tgz

Slackware 12.2 package:
0ece3456a2122326af3988a2b43c3ee5  php-5.3.23-i486-1_slack12.2.tgz

Slackware 13.0 package:
8a086a3085e8e91db78c32248b90ce2e  php-5.3.23-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
382222ce4f23f9edb0b26287ca061daa  php-5.3.23-x86_64-1_slack13.0.txz

Slackware 13.1 package:
6213d2b220b363457b2a6e98c6f06115  php-5.3.23-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
83ae48d2683b4834a98f0fbaa4138727  php-5.3.23-x86_64-1_slack13.1.txz

Slackware 13.37 package:
e4a7db62a60324f925d72ab244817749  php-5.3.23-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
8b8325f537c7e30d6003e303aafce575  php-5.3.23-x86_64-1_slack13.37.txz

Slackware 14.0 package:
037eb3196eb7d2a031d85191eafce18e  php-5.4.13-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
e74abaff1cb141954c31a5caad98723b  php-5.4.13-x86_64-1_slack14.0.txz

Slackware -current package:
3434f4215098b47d258e715751a3d05c  n/php-5.4.13-i486-1.txz

Slackware x86_64 -current package:
4f90538a3b6b326c28ffba02452e1cb3  n/php-5.4.13-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg php-5.4.13-i486-1_slack14.0.txz

Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com




Spotlight

New Zeus variant targets users of 150 banks

Posted on 19 December 2014.  |  A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Dec 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //