TITLE: Mandriva update for php SECUNIA ADVISORY ID: SA19499 VERIFY ADVISORY: http://secunia.com/advisories/19499/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ DESCRIPTION: Mandriva has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to gain knowledge of potentially sensitive information. For more information: SA19383 SOLUTION: Apply updated packages. -- Mandrivalinux 2006 -- 2a7b4c48f38f0ca7ca1bfc6ee017e27b 2006.0/RPMS/libphp5_common5-5.0.4-9.4.20060mdk.i586.rpm 2b0fe0ae0adfcea994618097ccd8f43e 2006.0/RPMS/php-cgi-5.0.4-9.4.20060mdk.i586.rpm 6495845826ffc3963ea5fa7602413d99 2006.0/RPMS/php-cli-5.0.4-9.4.20060mdk.i586.rpm 67e7e6ac6ffd75ebb3cfb067e16a6e90 2006.0/RPMS/php-devel-5.0.4-9.4.20060mdk.i586.rpm a07dfb39972947e39fc464895703e54f 2006.0/RPMS/php-fcgi-5.0.4-9.4.20060mdk.i586.rpm c71f42f38e21d547bc3121df180a1f9d 2006.0/SRPMS/php-5.0.4-9.4.20060mdk.src.rpm -- Mandrivalinux 2006/X86_64 -- c8d248402a14d3395df39d8460b2d09e x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.4.20060mdk.x86_64.rpm 48903c848a6b6e95e602c9167f21140b x86_64/2006.0/RPMS/php-cgi-5.0.4-9.4.20060mdk.x86_64.rpm cf2c3ef8f5dd6a399026777f225e61c2 x86_64/2006.0/RPMS/php-cli-5.0.4-9.4.20060mdk.x86_64.rpm 78f44b12e62d382cdde698eddb98de7d x86_64/2006.0/RPMS/php-devel-5.0.4-9.4.20060mdk.x86_64.rpm e6f2546f0ad6786b235ff9d3a5037f18 x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.4.20060mdk.x86_64.rpm c71f42f38e21d547bc3121df180a1f9d x86_64/2006.0/SRPMS/php-5.0.4-9.4.20060mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:063 OTHER REFERENCES: SA19383: http://secunia.com/advisories/19383/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------