-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2008.0398 -- [UNIX/Linux][Debian]
             New suphp packages fix local privilege escalation
                               18 April 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              suphp
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Increased Privileges
Access:               Existing Account
CVE Names:            CVE-2008-1614

Original Bulletin:    http://www.debian.org/security/2008/dsa-1550

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Debian. It is recommended that administrators
         running suphp check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1550-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
April 17, 2008                        http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : suphp
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-1614
Debian Bug     : 475431

It was discovered that suphp, an Apache module to run PHP scripts with
owner permissions handles symlinks insecurely, which may lead to
privilege escalation by local users.

For the stable distribution (etch), this problem has been fixed in
version 0.6.2-1+etch0.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your suphp packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc and s390.

Source archives:

  http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.diff.gz
    Size/MD5 checksum:    84478 1a1eede94aac39e7e7a2b6113c1ecc92
  http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2.orig.tar.gz
    Size/MD5 checksum:   372241 3ee72ad0198587b533045add6681c884
  http://security.debian.org/pool/updates/main/s/suphp/suphp_0.6.2-1+etch0.dsc
    Size/MD5 checksum:      790 3aa0720205a32221eb52a981ddcdfd89

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_alpha.deb
    Size/MD5 checksum:    15648 b8fadf36126f8f6a33630370260e277f
  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_alpha.deb
    Size/MD5 checksum:    93420 cffd9423e55b7f4b4ddc332b7f039045
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_alpha.deb
    Size/MD5 checksum:    17640 3dadfc97bba8c09fc415fd36f08e0d80

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_amd64.deb
    Size/MD5 checksum:    15330 4d08416e7e914acdb6f26249de4d8aa6
  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_amd64.deb
    Size/MD5 checksum:    83372 67e1aaacf2ab9fe93f3869465e0825c6
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_amd64.deb
    Size/MD5 checksum:    17214 580934d3a0ef003d62fe2baf2f0a58d8

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_arm.deb
    Size/MD5 checksum:    93974 4e5d85f6c81e3c838af9d394bb967d32
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_arm.deb
    Size/MD5 checksum:    16518 c59d80322cd3eb62b8e39623a20a665c
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_arm.deb
    Size/MD5 checksum:    14792 dbe97d39a6bfa069b1704c11d7230cf7

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_hppa.deb
    Size/MD5 checksum:    92534 f0e9f893e92cc4ee3540096d1b719c22
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_hppa.deb
    Size/MD5 checksum:    15940 79b30f1a14baf9feb9290513b16d079f
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_hppa.deb
    Size/MD5 checksum:    18070 b46a68761c0bafbc5b4e05d5500ded75

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_i386.deb
    Size/MD5 checksum:    16834 7f11e90a62d921b5db283f3ade65d726
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_i386.deb
    Size/MD5 checksum:    15130 7728dd5ffa43ec81d94113b0511fa92b
  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_i386.deb
    Size/MD5 checksum:    82364 8c7696c278a9c9693ed3c46be3c087c3

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_ia64.deb
    Size/MD5 checksum:    19814 5aa2a4f35444853a9aed5e428ac707b7
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_ia64.deb
    Size/MD5 checksum:    17088 30455e4e07ccaea8f3fa246aaa4322eb
  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_ia64.deb
    Size/MD5 checksum:   104372 84cd23d6177fb776f3b7816745c79532

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mips.deb
    Size/MD5 checksum:    79722 c6045f7f612218f2e3a31ef35d1bde66
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mips.deb
    Size/MD5 checksum:    15060 dd6841e4b5f1d8d8ae8bf187808f6bf4
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mips.deb
    Size/MD5 checksum:    16974 5a1c0ade8c20b703cdb654b84e6d4a2f

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_mipsel.deb
    Size/MD5 checksum:    79196 b93468fa514e31688cd5bad1ea31879d
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_mipsel.deb
    Size/MD5 checksum:    16954 57f4652573880cc60e023a99a7c0cd7b
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_mipsel.deb
    Size/MD5 checksum:    15056 6b0578906d3431a71fdd95b29a8208ca

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_powerpc.deb
    Size/MD5 checksum:    16586 f31ba2b8492ab15a36d04c57f124ba27
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_powerpc.deb
    Size/MD5 checksum:    18462 5b6fa3933397f8156036e8cd05a2f23d
  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_powerpc.deb
    Size/MD5 checksum:    80246 5947075d36dbbc22331745f24c2e22f4

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/s/suphp/suphp-common_0.6.2-1+etch0_s390.deb
    Size/MD5 checksum:    72420 e12e97657ccd10331027e9f7276b4767
  http://security.debian.org/pool/updates/main/s/suphp/libapache-mod-suphp_0.6.2-1+etch0_s390.deb
    Size/MD5 checksum:    15634 f62b4b178ee5b09476fdfc7ea19a02b2
  http://security.debian.org/pool/updates/main/s/suphp/libapache2-mod-suphp_0.6.2-1+etch0_s390.deb
    Size/MD5 checksum:    17578 a686adaadafa18f74d18b19434236cc5


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIB8B8Xm3vHE4uyloRAi4JAKCLvK1Pioh2Cr+uM/lB7F1PCPEyEACcC2f5
8m1ZpMNFSHlUw4DQ9BtY9kM=
=twLM
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSAfwbCh9+71yA2DNAQLMAAP/emwQIWXEx7IbL5bXqPrsbwFPhYZ6FUlH
0ymMBqItKN1Qqk4o9ZsaqFHXTRLdTZRTweKEY7FDQCLOWQkbvF3nBIk9Y+/nfsgQ
yRyv14nPRxmTtTEncJRiHwBhhQ119f4ECPxHVatu7rHrSNSBTGPk3WM8qJVY/Kiu
5uyynZbdqKU=
=o563
-----END PGP SIGNATURE-----