Security update for PHP4
(Last modified: 12JUN2003)
solutions Security update for PHP4 SuSE Linux Maintenance Web (ec679005fffda0bacbc3d7b3fcef8dfc)
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Enterprise Server 8 for AMD64
- The function
session_decode()causes a segmentation fault when used used without calling
- Unsetting an element in the
$_SESSIONarray and assigning a value to the corresponding global variable results in the content of the global variable being assigned to the session, despite the variable not being associated with the session anymore.
session_start(); session_decode('example|s:14:"original value";'); #unset($_SESSION['example']); $example = 'assigned directly'; print(session_encode());
This script will print the stored value for the
examplesession variable ("original value"), with the
unset()call uncommented it will erroneously assign "assinged directly" to the session variable.
rpm -Fvh mod_php4.rpm mod_php4-devel.rpm mod_php4-core.rpm mod_php4-servlet.rpm
Please do not forget to restart the web server or servlet engine after the update.
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.