Home > Security > Advisories

Advisories

Mandriva Advisories

Package name php
Date May 24th, 2006
Advisory ID MDKSA-2006:091
Affected versions CS3.0, MNF2.0, 10.2, 2006.0
Synopsis Updated php packages fix vulnerabilities

Problem Description

An integer overflow in the wordwrap() function could allow attackers
to execute arbitrary code via certain long arguments that cause a small
buffer to be allocated, triggering a heap-based buffer overflow
(CVE-2006-1990).

The substr_compare() function in PHP 5.x and 4.4.2 could allow
attackers to cause a Denial of Service (memory access violation)
via an out-of-bounds offset argument (CVE-2006-1991).

The second vulnerability only affects Mandriva Linux 2006; earlier
versions shipped with older versions of PHP that do not contain the
substr_compare() function.

Updated Packages

Corporate Server 3.0

 bb6a0d81b011c1f859fb741544154b07  corporate/3.0/RPMS/libphp_common432-4.3.4-4.16.C30mdk.i586.rpm
 e2d7f6bc462561ade323f97558491e8a  corporate/3.0/RPMS/php432-devel-4.3.4-4.16.C30mdk.i586.rpm
 61f46043b662e05c6eb33ab9ca28661a  corporate/3.0/RPMS/php-cgi-4.3.4-4.16.C30mdk.i586.rpm
 8ca7582e4edab0bf77f260247401d94d  corporate/3.0/RPMS/php-cli-4.3.4-4.16.C30mdk.i586.rpm
 b411e308d530cc2879b3087eb3f0f016  corporate/3.0/SRPMS/php-4.3.4-4.16.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 9cdb80932f1e0a551fe6e494b4fe7436  x86_64/corporate/3.0/RPMS/lib64php_common432-4.3.4-4.16.C30mdk.x86_64.rpm
 9027c979fa2b6b05917941f51c621a0a  x86_64/corporate/3.0/RPMS/php432-devel-4.3.4-4.16.C30mdk.x86_64.rpm
 b1fad86cb60c067daebba9383d033c84  x86_64/corporate/3.0/RPMS/php-cgi-4.3.4-4.16.C30mdk.x86_64.rpm
 d43daff0afa35122d1dfa29291b94fd3  x86_64/corporate/3.0/RPMS/php-cli-4.3.4-4.16.C30mdk.x86_64.rpm
 b411e308d530cc2879b3087eb3f0f016  x86_64/corporate/3.0/SRPMS/php-4.3.4-4.16.C30mdk.src.rpm

Multi Network Firewall 2.0

 9bb29e292e0f7612bd3ca38762262c85  mnf/2.0/RPMS/libphp_common432-4.3.4-4.16.M20mdk.i586.rpm
 9ad22ab66b3523d634dad69e126f7f44  mnf/2.0/RPMS/php432-devel-4.3.4-4.16.M20mdk.i586.rpm
 6d130a0f45e5a23b1134a2ef5a721995  mnf/2.0/RPMS/php-cgi-4.3.4-4.16.M20mdk.i586.rpm
 725f1e0d0fa61e2a912f2899225b6f87  mnf/2.0/RPMS/php-cli-4.3.4-4.16.M20mdk.i586.rpm
 29c7cfe26747e0fcd9168448e47dbc75  mnf/2.0/SRPMS/php-4.3.4-4.16.M20mdk.src.rpm

Mandriva Linux LE2005

 463d4dd124e7e161159703976b35344d  10.2/RPMS/libphp_common432-4.3.10-7.12.102mdk.i586.rpm
 0a71e94de99b08ba787b23ef64c10357  10.2/RPMS/php432-devel-4.3.10-7.12.102mdk.i586.rpm
 cfcaf5c400bd4d7ca64a2ae25eccb0b7  10.2/RPMS/php-cgi-4.3.10-7.12.102mdk.i586.rpm
 321b4cad92d82d9bcd1f18170390f8ae  10.2/RPMS/php-cli-4.3.10-7.12.102mdk.i586.rpm
 1bf084222c4f33676432bfb516d71582  10.2/SRPMS/php-4.3.10-7.12.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 54243bc33bd55e326aa05f321f767442  x86_64/10.2/RPMS/lib64php_common432-4.3.10-7.12.102mdk.x86_64.rpm
 c1a6b0c185e4b39404493290cb80f86f  x86_64/10.2/RPMS/php432-devel-4.3.10-7.12.102mdk.x86_64.rpm
 b643924edc6d25dfeecdbb1cef532341  x86_64/10.2/RPMS/php-cgi-4.3.10-7.12.102mdk.x86_64.rpm
 d393dc26dadaadf34fc6b7b44ee46399  x86_64/10.2/RPMS/php-cli-4.3.10-7.12.102mdk.x86_64.rpm
 1bf084222c4f33676432bfb516d71582  x86_64/10.2/SRPMS/php-4.3.10-7.12.102mdk.src.rpm

Mandriva Linux 2006

 cbb4891a5ab88238d462a66e7363119e  2006.0/RPMS/libphp5_common5-5.0.4-9.9.20060mdk.i586.rpm
 dd77930acc185da44c6946252d445438  2006.0/RPMS/php-cgi-5.0.4-9.9.20060mdk.i586.rpm
 5de2486af340d1fe387f7ecafdf85df1  2006.0/RPMS/php-cli-5.0.4-9.9.20060mdk.i586.rpm
 6dd3b49d29cc28508ea3efdb69e72a79  2006.0/RPMS/php-devel-5.0.4-9.9.20060mdk.i586.rpm
 8e074aedcbd3126797bbe11c93e5bd04  2006.0/RPMS/php-fcgi-5.0.4-9.9.20060mdk.i586.rpm
 f144d3a41b04047b9d8c536a37aa94e1  2006.0/SRPMS/php-5.0.4-9.9.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 2e0821b3b925cc9c37391b061045c303  x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.9.20060mdk.x86_64.rpm
 c0ad86b0b332c058a9a18f5a41aca912  x86_64/2006.0/RPMS/php-cgi-5.0.4-9.9.20060mdk.x86_64.rpm
 3c1ed4a2f1063fc53aec7a776af24939  x86_64/2006.0/RPMS/php-cli-5.0.4-9.9.20060mdk.x86_64.rpm
 855bd247b561da4284eacbab95432123  x86_64/2006.0/RPMS/php-devel-5.0.4-9.9.20060mdk.x86_64.rpm
 c504785298c305fd107ea6fdeff52211  x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.9.20060mdk.x86_64.rpm
 f144d3a41b04047b9d8c536a37aa94e1  x86_64/2006.0/SRPMS/php-5.0.4-9.9.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.