Secunia Security Advisory - Gentoo has issued an update for php. This fixes multiple vulnerabilities, where some have an unknown impact and others that can potentially be exploited by malicious, local users and by malicious users to bypass certain security restrictions, and by malicious people to conduct cross-site scripting attacks, disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
84380ba419fc68c394a7bd119fb3c7d79a5e4682aa4622983cb6ff860c0390be
----------------------------------------------------------------------
Follow Secunia on Twitter
http://twitter.com/secunia
----------------------------------------------------------------------
TITLE:
Gentoo update for php
SECUNIA ADVISORY ID:
SA38090
VERIFY ADVISORY:
http://secunia.com/advisories/38090/
DESCRIPTION:
Gentoo has issued an update for php. This fixes multiple
vulnerabilities, where some have an unknown impact and others that
can potentially be exploited by malicious, local users and by
malicious users to bypass certain security restrictions, and by
malicious people to conduct cross-site scripting attacks, disclose
sensitive information, cause a DoS (Denial of Service), or
potentially compromise a vulnerable system.
For more information:
SA32964
SA33275
SA34081
SA36791
SA37069
SA37821
SOLUTION:
Update to "dev-lang/php-5.2.12" or later.
NOTE: If the imap or kolab USE flag is enabled, update to
"net-libs/c-client-2007e" or later before updating PHP.
ORIGINAL ADVISORY:
GLSA 201001-03:
http://www.gentoo.org/security/en/glsa/glsa-201001-03.xml
OTHER REFERENCES:
SA32964:
http://secunia.com/advisories/32964/
SA33275:
http://secunia.com/advisories/33275/
SA34081:
http://secunia.com/advisories/34081/
SA36791:
http://secunia.com/advisories/36791/
SA37069:
http://secunia.com/advisories/37069/
SA37821:
http://secunia.com/advisories/37821/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------