Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 2.1 product line. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 196257

Summary: CVE-2006-3017 zend_hash_del bug
Product: Red Hat Enterprise Linux 2.1 Reporter: Mark J. Cox <mjc>
Component: phpAssignee: Joe Orton <jorton>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 2.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: reported=20060516,impact=moderate,public=20060614,source=vendorsec
Fixed In Version: RHSA-2006-0567 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-07-25 12:07:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2006-06-22 08:37:19 UTC
+++ This bug was initially created as a clone of Bug #196256 +++

CVE-2006-2657: A bug in zend_hash_del() allowed attackers to prevent
unsetting of some variables.  Fixed upstream in PHP 5.1.4

This could be bad for scripts where register_globals is on as often variables
are only initialized by unsetting them,  but it could also have side effects on
other scripts depending on the script.

Upstream fix:

http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&r1=1.87.4.8.2.1&r2=1.87.4.8.2.2

Affects RHEL3, RHEL4 (RHEL2.1 separate tracking bug)

Comment 3 Red Hat Bugzilla 2006-07-25 12:07:08 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0567.html