Upgrade Apache & PHP

Saat ini kami telah mengupgrade Apache dan PHP di server machine04.
Changes with Apache 1.3.41

*) SECURITY: CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason. [Mark Cox]

Changes with Apache 1.3.40 (not released)

*) SECURITY: CVE-2007-5000 (cve.mitre.org)
mod_imap: Fix cross-site scripting issue. Reported by JPCERT.
[Joe Orton]

*) SECURITY: CVE-2007-3847 (cve.mitre.org)
mod_proxy: Prevent reading past the end of a buffer when parsing
date-related headers. PR 41144.
With Apache 1.3, the denial of service vulnerability applies only
to the Windows and NetWare platforms.
[Jeff Trawick]

*) More efficient implementation of the CVE-2007-3304 PID table
patch. This fixes issues with excessive memory usage by the
parent process if long-running and with a high number of child
process forks during that timeframe. Also fixes bogus “Bad pid”
errors. [Jim Jagielski, Jeff Trawick]

Security Enhancements and Fixes in PHP 4.4.8:

  • Improved fix for MOPB-02-2007.
  • Fixed an integer overflow inside chunk_split(). Identified by Gerhard Wagner.
  • Fixed integer overlow in str[c]spn().
  • Fixed regression in glob when open_basedir is on introduced by #41655 fix.
  • Fixed money_format() not to accept multiple %i or %n tokens.
  • Addded “max_input_nesting_level” php.ini option to limit nesting level of input variables. Fix for MOPB-03-2007.
  • Fixed INFILE LOCAL option handling with MySQL – now not allowed when open_basedir or safe_mode is active.
  • Fixed session.save_path and error_log values to be checked against open_basedir and safe_mode (CVE-2007-3378).

For a full list of changes in PHP 4.4.8, see the ChangeLog.

Posted in News. No Comments »

Comments are closed.