Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 306939 - <dev-lang/php-5.2.13: Multiple security vulnerabilities (CVE-2009-5016,CVE-2010-{1128,1129,1130})
Summary: <dev-lang/php-5.2.13: Multiple security vulnerabilities (CVE-2009-5016,CVE-20...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.php.net/ChangeLog-5.php#5....
Whiteboard: B3 [glsa]
Keywords:
: 310083 (view as bug list)
Depends on:
Blocks:
 
Reported: 2010-02-26 11:14 UTC by Joshua Wright
Modified: 2011-10-10 20:44 UTC (History)
10 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
php 5.2.13 ebuild patch (against php-5.2.12.ebuild) (php-5.2.13.ebuild.patch,592 bytes, patch)
2010-03-19 21:48 UTC, Bernd Lommerzheim
no flags Details | Diff
php patchset 5.2.13-r0 (php-patchset-5.2.13-r0.tar.bz2,9.94 KB, application/octet-stream)
2010-03-19 21:49 UTC, Bernd Lommerzheim
no flags Details
php 5.2.13 ebuild patch (against php-5.2.12.ebuild) (php-5.2.13.ebuild.patch,596 bytes, patch)
2010-03-19 22:12 UTC, Bernd Lommerzheim
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Joshua Wright 2010-02-26 11:14:47 UTC
The PHP development team would like to announce the immediate availability of PHP 5.2.13. This release focuses on improving the stability of the PHP 5.2.x branch with over 40 bug fixes, some of which are security related. All users of PHP 5.2 are encouraged to upgrade to this release. 

Reproducible: Always
Comment 1 Tony Vroon (RETIRED) gentoo-dev 2010-02-26 12:17:23 UTC
Could the PHP herd please provide an ebuild for 5.2.13.

Herd maintenance: Please note that php@ does not go anywhere. If your herd has been disbanded, please update metadata.xml for dev-lang/php; CCing last two committers in ChangeLog instead.
Comment 2 Doktor Notor 2010-02-26 13:10:58 UTC
(In reply to comment #1)
> Herd maintenance: Please note that php@ does not go anywhere. If your herd has
> been disbanded, please update metadata.xml for dev-lang/php; CCing last two
> committers in ChangeLog instead.

The alias is php-bugs@ 

Comment 3 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2010-03-18 20:44:01 UTC
*** Bug 310083 has been marked as a duplicate of this bug. ***
Comment 4 Bernd Lommerzheim 2010-03-19 21:47:42 UTC
Today I created a version bump for php 5.2.13 in my local overlay. Maybe it helps to bump php to 5.2.13 in the portage tree. I will attach the php-5.2.13.ebuild patch (against php-5.2.12.ebuild) and the php-patchset-5.2.13-r0.tar.bz2. The ebuild patch removes the removal of the bug16069.phpt test because it is not included into the php package anymore. The php patchset is just a copy of the 5.2.12-r0 patchset with the rename of "5.1.12" to "5.1.13" directory. Best regards.
Comment 5 Bernd Lommerzheim 2010-03-19 21:48:30 UTC
Created attachment 224281 [details, diff]
php 5.2.13 ebuild patch (against php-5.2.12.ebuild)
Comment 6 Bernd Lommerzheim 2010-03-19 21:49:01 UTC
Created attachment 224283 [details]
php patchset 5.2.13-r0
Comment 7 Bernd Lommerzheim 2010-03-19 22:12:06 UTC
Created attachment 224291 [details, diff]
php 5.2.13 ebuild patch (against php-5.2.12.ebuild)
Comment 8 Tobias Heinlein (RETIRED) gentoo-dev 2010-03-20 14:35:51 UTC
Thanks for the patch, I just committed it to CVS.

Arches, please test and mark stable:
=dev-lang/php-5.2.13
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 9 Brent Baude (RETIRED) gentoo-dev 2010-03-21 13:12:13 UTC
ppc64 done
Comment 10 Andreas Schürch gentoo-dev 2010-03-21 15:31:38 UTC
Looks good here on x86 also.
Comment 11 Oliver Welter 2010-03-21 16:28:29 UTC
compiles and looks good on amd64
Comment 12 Christian Faulhammer (RETIRED) gentoo-dev 2010-03-22 12:57:22 UTC
x86 stable, thanks Andreas
Comment 13 Brent Baude (RETIRED) gentoo-dev 2010-03-23 19:58:48 UTC
ppc done
Comment 14 Jeroen Roovers (RETIRED) gentoo-dev 2010-03-24 17:16:50 UTC
Stable for HPPA.
Comment 15 Raúl Porcel (RETIRED) gentoo-dev 2010-03-26 18:40:45 UTC
alpha/arm/ia64/s390/sh/sparc stable
Comment 16 oc666 2010-03-28 07:18:39 UTC
amd64 confirmed. Tested on 2 machines.
Comment 17 Markus Meier gentoo-dev 2010-03-29 21:59:58 UTC
amd64 stable, all arches done.
Comment 18 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-31 19:45:51 UTC
CVE-2010-1128 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1128):
  The Linear Congruential Generator (LCG) in PHP before 5.2.13 does not
  provide the expected entropy, which makes it easier for
  context-dependent attackers to guess values that were intended to be
  unpredictable, as demonstrated by session cookies generated by using
  the uniqid function.

CVE-2010-1129 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1129):
  The safe_mode implementation in PHP before 5.2.13 does not properly
  handle directory pathnames that lack a trailing / (slash) character,
  which allows context-dependent attackers to bypass intended access
  restrictions via vectors related to use of the tempnam function.

CVE-2010-1130 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1130):
  session.c in the session extension in PHP before 5.2.13, and 5.3.1,
  does not properly interpret ; (semicolon) characters in the argument
  to the session_save_path function, which allows context-dependent
  attackers to bypass open_basedir and safe_mode restrictions via an
  argument that contains multiple ; characters in conjunction with a ..
  (dot dot).

Comment 19 Stefan Behte (RETIRED) gentoo-dev Security 2010-04-09 16:20:32 UTC
GLSA request filed.
Comment 20 Matti Bickel (RETIRED) gentoo-dev 2010-12-19 14:42:57 UTC
Seeing B3 doesn't *require* a GLSA, please close this bug noglsa. It's been long overdue and there's a fresh security bug that is more important right now.
Comment 21 Tobias Heinlein (RETIRED) gentoo-dev 2010-12-19 15:05:29 UTC
(In reply to comment #20)
> Seeing B3 doesn't *require* a GLSA, please close this bug noglsa. It's been
> long overdue and there's a fresh security bug that is more important right now.

Yeah, you'd actually be right there. But when there are already bugs for which we need to issue a GLSA anyway, we also include others as well because it is only little more work for us.
Comment 22 GLSAMaker/CVETool Bot gentoo-dev 2011-10-07 22:14:02 UTC
CVE-2009-5016 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5016):
  Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP
  before 5.2.11 makes it easier for remote attackers to bypass cross-site
  scripting (XSS) and SQL injection protection mechanisms via a crafted string
  that uses overlong UTF-8 encoding, a different vulnerability than
  CVE-2010-3870.
Comment 23 Tobias Heinlein (RETIRED) gentoo-dev 2011-10-10 20:44:41 UTC
This issue was resolved and addressed in
 GLSA 201110-06 at http://security.gentoo.org/glsa/glsa-201110-06.xml
by GLSA coordinator Tobias Heinlein (keytoaster).