Säkerhetsbulletin från Debian

DSA-1550-1 suphp -- programmeringsfel

Rapporterat den:
2008-04-17
Berörda paket:
suphp
Sårbara:
Ja
Referenser i säkerhetsdatabaser:
I Debians felrapporteringssystem: Fel 475431.
I Mitres CVE-förteckning: CVE-2008-1614.
Ytterligare information:

Man har upptäckt att suphp, en Apachemodul för att köra PHP-skript med ägarbehörighet inte hanterar symboliska länkar på ett säkert sätt, vilket kunde leda till utökning av privilegier av lokala användare.

För den stabila utgåvan (Etch) har detta problem rättats i version 0.6.2-1+etch0.

För den instabila utgåvan (Sid) kommer detta problem rättas inom kort.

Vi rekommenderar att ni uppgraderar era suphp-paket.

Rättat i:

Debian GNU/Linux 4.0 (stable)

Källkod:
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.diff.gz
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2.orig.tar.gz
http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.dsc
Alpha:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_alpha.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_alpha.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_amd64.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_amd64.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_arm.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_arm.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_hppa.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_hppa.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_i386.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_i386.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_ia64.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_ia64.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mips.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mips.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mipsel.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mipsel.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_powerpc.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_powerpc.deb
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_s390.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_s390.deb
http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_s390.deb

MD5-kontrollsummor för dessa filer finns i originalbulletinen.