Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 166048 - dev-lang/php-5.2.1 version bump
Summary: dev-lang/php-5.2.1 version bump
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: PHP Bugs
URL: http://www.php.net/releases/5_2_1.php
Whiteboard:
Keywords:
Depends on:
Blocks: 133007 139350 152037 152933 153911 156260
  Show dependency tree
 
Reported: 2007-02-09 10:34 UTC by Bernd Marienfeldt
Modified: 2011-10-30 22:40 UTC (History)
7 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Bernd Marienfeldt 2007-02-09 10:34:37 UTC
This release is a major stability and security enhancement of the 5.X branch, and all users are strongly encouraged to upgrade to it as soon as possible.

Reproducible: Always
Comment 1 Patrick 2007-02-09 11:51:05 UTC
Would be nice to have it in portage!

Also read this: http://blog.php-security.org/archives/71-Month-of-PHP-Bugs-and-PHP-5.2.1.html (Stefan Esser announcing the Month of PHP bugs)
Comment 2 Dennis 2007-02-09 16:18:00 UTC
it would be really nice to have 5.2.1 in portage :) thank you
Comment 3 Richard Ash 2007-02-09 22:15:42 UTC
This is being bumped at me by my network-admin as a security advisory. Am I going to have to write my own ebuild?
Comment 4 Hanno Böck gentoo-dev 2007-02-10 12:48:01 UTC
Shouldn't this be a security-bug? The list of fixed security-issues in 5.2.1 is long:
 
Fixed possible safe_mode & open_basedir bypasses inside the session extension.
Prevent search engines from indexing the phpinfo() page.
Fixed a number of input processing bugs inside the filter extension.
Fixed unserialize() abuse on 64 bit systems with certain input strings.
Fixed possible overflows and stack corruptions in the session extension.
Fixed an underflow inside the internal sapi_header_op() function.
Fixed allocation bugs caused by attempts to allocate negative values in some code paths.
Fixed possible stack overflows inside zip, imap & sqlite extensions.
Fixed several possible buffer overflows inside the stream filters.
Fixed non-validated resource destruction inside the shmop extension.
Fixed a possible overflow in the str_replace() function.
Fixed possible clobbering of super-globals in several code paths.
Fixed a possible information disclosure inside the wddx extension.
Fixed a possible string format vulnerability in *print() functions on 64 bit systems.
Fixed a possible buffer overflow inside mail() and ibase_{delete,add,modify}_user() functions.
Fixed a string format vulnerability inside the odbc_result_all() function.
Memory limit is now enabled by default.
Added internal heap protection.
Extended filter extension support for $_SERVER in CGI and apache2 SAPIs.
Comment 5 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-02-10 22:24:21 UTC
Thanks Hanno, it's already handled in bug 153911 , comment #9
Comment 6 Bernd Marienfeldt 2007-02-11 16:32:51 UTC
(In reply to comment #4)
> Shouldn't this be a security-bug? The list of fixed security-issues in 5.2.1 is
> long:

Agree.

Regards
Comment 7 Conrad Kostecki gentoo-dev 2007-02-14 11:54:18 UTC
Yep, PHP 5.2.1 should be soon in Portage. Many Users want it.
Comment 8 Patrick 2007-02-15 12:40:00 UTC
Umm... it's kind of urgent, I believe... any information on when we can expect to have a halfway secure PHP installation on gentoo again? 

http://www.golem.de/0702/50570.html
Comment 9 Jakub Moc (RETIRED) gentoo-dev 2007-02-15 21:40:46 UTC
Kindly stop making useless noise here, thanks.

Comment 10 James Porter 2007-02-20 19:54:11 UTC
(In reply to comment #9)
> Kindly stop making useless noise here, thanks.
> 

The maintainer needs to comment on this, is really that hard to bump it or at least give a reason why it's not done yet? It's getting close to a week, I'm surprised there isn't an unstable one in yet...come on php herd.
Comment 11 Executioner 2007-02-21 02:53:48 UTC
Keep this in mind http://www.securityfocus.com/bid/22505 when 5.2 is put in portage.
Comment 12 Arne 2007-02-23 09:54:23 UTC
5.2.1 is in the php-testing overlay, please test and verify that the mentioned vulnerabilities have been patched.

Lots of thanks to chtekk :)
Comment 13 Conrad Kostecki gentoo-dev 2007-03-01 23:36:13 UTC
Where di I find php-testing-overlay ?
Comment 14 Luca Longinotti (RETIRED) gentoo-dev 2007-03-05 18:11:26 UTC
dev-lang/php-5.2.1-r3 is in the tree, enjoy, with Suhosin support!
Best regards, CHTEKK.
Comment 15 Dennis 2007-03-06 00:56:44 UTC
thank you very much, bro!