Security update for PHP4
Knowledgebase
(Last modified: 04SEP2006)
solutions Security update for PHP4 SuSE Linux Maintenance Web (47a19c67fad7fcec4d91c5a44208bcc5)
apache-mod_php4
apache2-mod_php4
mod_php4-core
php4-imap
php4-mysql
php4-session
php4-fastcgi
php4-devel
php4-sysvshm
php4-exif
php4-pear
php4-recode
php4-mbstring
php4-gd
php4-wddx
php4-curl
php4-pgsql
php4-servlet
Product(s): SUSE CORE 9 for Itanium Processor Family
Patch: patch-11202
Release: 20060904
Obsoletes: 96d092ab1925ede50674a8e6febbc9ef
ae77fd5dd5c7926fed4a1e163ec0f644
aafa6d723ed65ff9f0a06d23d12770ce
416640c73799c273cb78008c7d2b1c88
02f7ca620fa47aed580ac78750ea5c52
cb26dfd5c2e6259554ea496104a27638
eb6734193188e5e67d6f06e03c942de2
cc880d8594257d1c37f5c5e40549ab75
b0cc027d40188c4f2c516845c31cc69f
2e855be5ae7903ca40477ba01d9c9d02
ff2ec6a0837959e29a8a2ceeb1113997
8c18bdf6bfa820f30d97b67dccd437c4
d1695b6b87aaeba49edeb90ee2c3e31f
8024627035edd1ff4446dc3a7d3f24d3
7fc9fde927d1b85e15a73d30fa51731f
872c84fe4ddb36cc6c947d71d9705360
- The CURL module lacked checks for control characters (CVE-2006-2563.))
str_repeat()
contained an integer overflow.ext/wddx
contained a buffer overflow.memory_limit()
lacked checks for integer overflows- A bug in
sscanf()
could potentially be exploited to execute arbitrary code (CVE-2006-4020). - Corrupt GIF images could crash PHP.
rpm -Fvh php4.rpm apache-mod_php4.rpm apache2-mod_php4.rpm mod_php4-core.rpm php4-imap.rpm php4-mysql.rpm php4-session.rpm php4-fastcgi.rpm php4-devel.rpm php4-sysvshm.rpm php4-exif.rpm php4-pear.rpm php4-recode.rpm php4-mbstring.rpm php4-gd.rpm php4-wddx.rpm php4-curl.rpm php4-pgsql.rpm php4-servlet.rpm
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.