Date: Thu, 24 Jun 1999 15:15:18 -0500
From: yocum@fnal.gov
To: wolff@BitWizard.nl
Subject: [linux-security] Forw: [RHEA-1999:010-01] Update to PHP 3.0.9 (mod_php3)
...and another one.
Of course, if you subscribed to the redhat-watch list then I wouldn't have to
forward these (hint, hint).
;)
Cheers,
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 | // \\ N
Batavia, IL 60510 | "TANSTAAFL" /( )\ U
________________________________|_________________________________ ^`~'^__X_
------- Forwarded Message
Return-Path: redhat-watch-list-request@redhat.com
Received: from lists.redhat.com (lists.redhat.com [199.183.24.247])
by sapphire.fnal.gov (8.8.7/8.8.7) with SMTP id OAA08366
for <yocum@sapphire.fnal.gov>; Tue, 22 Jun 1999 14:34:24 -0500
Received: (qmail 26381 invoked by uid 501); 22 Jun 1999 20:28:24 -0000
Resent-Date: 22 Jun 1999 20:28:24 -0000
Resent-Cc: recipient list not shown: ;
MBOX-Line: From redhat-watch-list-request@redhat.com Tue Jun 22 16:28:23 1999
X-Authentication-Warning: dionysus.devel.redhat.com: pbrown owned process
doing -bs
Date: Tue, 22 Jun 1999 10:59:08 -0400 (EDT)
From: Preston Brown <pbrown@redhat.com>
X-Sender: pbrown@dionysus.devel.redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHEA-1999:010-01] Update to PHP 3.0.9 (mod_php3)
Message-ID: <Pine.LNX.4.10.9906221057270.24544-100000@dionysus.devel.redhat.com
>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Approved: djb@redhat.com
Resent-Message-ID: <"51h9y1.0.AQ6.d7_Rt"@lists.redhat.com>
Resent-From: redhat-watch-list@redhat.com
Reply-To: redhat-watch-list@redhat.com
X-Mailing-List: <redhat-watch-list@redhat.com> archive/latest/37
X-Loop: redhat-watch-list@redhat.com
Precedence: list
Resent-Sender: redhat-watch-list-request@redhat.com
X-URL: http://www.redhat.com
- -----BEGIN PGP SIGNED MESSAGE-----
- - ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Update to PHP 3.0.9 (mod_php3)
Advisory ID: RHEA-1999:010-01
Issue date: 1999-06-21
Keywords: mod_php3 php fclose postgresql imap pgsql
- - ---------------------------------------------------------------------
1. Topic:
New PHP 3.0.9 (mod_php3) RPMs are available for Red Hat Linux 6.0.
These RPMs replace a previous errata release which fixed some, but not
all, of the problems with the original PHP3 RPMs included in Red Hat
Linux 6.0.
2. BugIDs fixed:
3273
3. Relevant releases/architectures:
Red Hat Linux 6.0, all architectures
4. Obsoleted by:
5. Conflicts with:
6. RPMs required:
Intel: ftp://updates.redhat.com/6.0/i386/
mod_php3-3.0.9-1.i386.rpm
mod_php3-imap-3.0.9-1.i386.rpm
mod_php3-manual-3.0.9-1.i386.rpm
mod_php3-pgsql-3.0.9-1.i386.rpm
Alpha: ftp://updates.redhat.com/6.0/alpha/
mod_php3-3.0.9-1.alpha.rpm
mod_php3-imap-3.0.9-1.alpha.rpm
mod_php3-manual-3.0.9-1.alpha.rpm
mod_php3-pgsql-3.0.9-1.alpha.rpm
Sparc: ftp://updates.redhat.com/6.0/sparc
mod_php3-3.0.9-1.sparc.rpm
mod_php3-imap-3.0.9-1.sparc.rpm
mod_php3-manual-3.0.9-1.sparc.rpm
mod_php3-pgsql-3.0.9-1.sparc.rpm
7. Problem description:
Red Hat Linux 6.0 shipped with PHP 3.0.7. This release of PHP had
some problems with glibc 2.1. A later errata release corrected those
problems, but it had problems with postgresql, which it intended to
support.
8. Solution:
This release corrects all known problems with PHP3, as well as adding
modular postgresql and imap support. Upgrade to the new PHP 3.0.9 RPMs.
For each RPM for your particular architecture, run:
rpm -Uvh <filename>
where filename is the name of the RPM.
You will need to install at least the base mod_php3 RPM, and
optionally the imap and pgsql subpackages for IMAP and PostgreSQL
support. You may wish to install the manual subpackage as well to
have the HTML-formatted PHP documentation available.
9. Verification:
These packages are PGP signed by Red Hat Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nopgp <filename>
10. References:
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv
iQCVAwUBN2+kTNLHqShaOYAxAQGzLAP+OhDPnYo8/t9J/IIKt0UFJAY2lUKtxD8l
wM3xQGyANOJmaOZJkIiPZbZFZzmmjccpQej/Z5ScW+gJFtJcs0QNoCC60vwuq2MS
iu0Hbkmrw47RbCnSl4TyMlQw8t+frDDAPAcqrCFC5VATwHTn87J6t+nyiYZHXRNJ
HV6nt1aTBcE=
=ACBZ
- -----END PGP SIGNATURE-----
- ---
Preston Brown
Red Hat, Inc.
pbrown@redhat.com
PGP public key: http://www.redhat.com/~pbrown/pbrown-pgp-pubkey.txt
- --
To unsubscribe: mail redhat-watch-list-request@redhat.com with
"unsubscribe" as the Subject.
------- End of Forwarded Message
--
----------------------------------------------------------------------
Please refer to the information about this list as well as general
information about Linux security at http://www.aoy.com/Linux/Security.
----------------------------------------------------------------------
To unsubscribe:
mail -s unsubscribe linux-security-request@redhat.com < /dev/null