Risks
Advisories
Browse
or
or
Slackware Security Advisory - php (SSA:2013-081-01)
[slackware-security]  php (SSA:2013-081-01)

New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,
14.0, and -current to fix security issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/php-5.4.13-i486-1_slack14.0.txz:  Upgraded.
  This release fixes two security issues in SOAP:
  Added check that soap.wsdl_cache_dir conforms to open_basedir.
  Disabled external entities loading.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/php-5.3.23-i486
-1_slack12.1.tgz

Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/php-5.3.23-i486
-1_slack12.2.tgz

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/php-5.3.23-i486
-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/php-5.3.23-x8
6_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/php-5.3.23-i486
-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/php-5.3.23-x8
6_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/php-5.3.23-i48
6-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/php-5.3.23-x
86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.13-i486
-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.13-x8
6_64-1_slack14.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.13-i486-1
.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.13-x8
6_64-1.txz


MD5 signatures:
+-------------+

Slackware 12.1 package:
5a254080f3b91fbb01fc661e404dd2b1  php-5.3.23-i486-1_slack12.1.tgz

Slackware 12.2 package:
0ece3456a2122326af3988a2b43c3ee5  php-5.3.23-i486-1_slack12.2.tgz

Slackware 13.0 package:
8a086a3085e8e91db78c32248b90ce2e  php-5.3.23-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
382222ce4f23f9edb0b26287ca061daa  php-5.3.23-x86_64-1_slack13.0.txz

Slackware 13.1 package:
6213d2b220b363457b2a6e98c6f06115  php-5.3.23-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
83ae48d2683b4834a98f0fbaa4138727  php-5.3.23-x86_64-1_slack13.1.txz

Slackware 13.37 package:
e4a7db62a60324f925d72ab244817749  php-5.3.23-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
8b8325f537c7e30d6003e303aafce575  php-5.3.23-x86_64-1_slack13.37.txz

Slackware 14.0 package:
037eb3196eb7d2a031d85191eafce18e  php-5.4.13-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
e74abaff1cb141954c31a5caad98723b  php-5.4.13-x86_64-1_slack14.0.txz

Slackware -current package:
3434f4215098b47d258e715751a3d05c  n/php-5.4.13-i486-1.txz

Slackware x86_64 -current package:
4f90538a3b6b326c28ffba02452e1cb3  n/php-5.4.13-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg php-5.4.13-i486-1_slack14.0.txz

Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com




Spotlight

Infographic: 25 years of the firewall

Posted on 24 July 2014.  |  The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, you’ll notice the firewall's introduction and evolution coincide with certain security events.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Jul 25th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //