Slackware Security Updates: kcheckpass, PHP5 and mod_ssl

There are updates for the kdebase, PHP5 and mod_ssl packages available for the Slackware linux distribution.

Details of the update for kcheckpass:

New kdebase packages are available for Slackware 10.0, 10.1, and -current to fix a security issue with the kcheckpass program. Earlier versions of Slackware are not affected. A flaw in the way the program creates lockfiles could allow a local attacker to gain root privileges.

For more details about the issue, see:

http://www.kde.org/info/security/advisory-20050905-1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2494

Details of the update for PHP5:

A new php5 package is available for Slackware 10.1 in /testing to fix security issues. PHP has been relinked with the shared PCRE library to fix an overflow issue with PHP’s builtin PRCE code, and PEAR::XMLRPC has been upgraded to version 1.4.0 which eliminates the eval() function. The eval() function is believed to be insecure as implemented, and would be difficult to secure.

Note that this new package now requires that the PCRE package be installed, so be sure to get the new package from the patches/packages/directory if you don’t already have it.

More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498

Details of the update for mod_ssl:

New mod_ssl packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix a security issue. If “SSLVerifyClient optional” was configured in the global section of the config file, it could improperly override “SSLVerifyClient require” in a per-location section.

More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700

Updated packages can be downloaded from the Slackware Package Browser or using automated package management tools like Swaret or slapt-get.