Debians sikkerhedsbulletin

DSA-1550-1 suphp -- programmeringsfejl

Rapporteret den:
17. apr 2008
Berørte pakker:
suphp
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Debians fejlsporingssystem: Fejl 475431.
I Mitres CVE-ordbog: CVE-2008-1614.
Yderligere oplysninger:

Man opdagede at suphp, et Apache-modul til afvikling af PHP-skripter med ejerrettigheder, håndterede symboliske links på usikker vis, hvilket kunne føre til lokale brugeres rettighedsforøgelse.

I den stabile distribution (etch), er dette problem rettet i version 0.6.2-1+etch0.

I den ustabile distribution (sid), vil dette problem snart blive rettet.

Vi anbefaler at du opgraderer dine suphp-pakker.

Rettet i:

Debian GNU/Linux 4.0 (stable)

Kildekode:
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.diff.gz
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2.orig.tar.gz
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.dsc
Alpha:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_alpha.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_alpha.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_amd64.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_amd64.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_arm.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_arm.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_hppa.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_hppa.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_i386.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_i386.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_ia64.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_ia64.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mips.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mips.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mipsel.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mipsel.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_powerpc.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_powerpc.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_s390.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_s390.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_s390.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.