Channels ▼
RSS

Database

PHP Augmented For Stability


Open source PHP language converts have been handed a new version release this August with around 20 bug fixes and a series of augmentations designed to address both security and stability.

The PHP development team confirms that PHP 5.5.2 includes a fix to a security issue in OpenSSL module (CVE-2013-4248) and resolution of the session fixation problem (CVE-2011-4718).

All users of PHP are encouraged to upgrade to this release — although it should also be said that there currently exists a number of releases that would be classified as "stable" including the 5.5, 5.4, and 5.3 PHP versions.

The CVE-2013-4113 security flaw is a memory heap corruption issue in PHP's XML parser which is said (in the case of a heap corruption flaw occurring) to be able to create a potential opportunity for a malicious hacker to run unauthorized code.

Other flaws such as the CVE-2013-4113 flaw were in fact recorded and reported earlier in the year and fixed in earlier versions of PHP, 5.5.1 and 5.3.27 versions to be specific.

The full ChangeLog can be found here. These PHP security updates have been undertaken under baseline vulnerability standards overseen by the National Institute of Standards and Technology's (NIST's) National Vulnerability Database and its CVSS Common Vulnerability Scoring System.

NOTE: The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. Its quantitative model ensures repeatable accurate measurement while enabling users to see the underlying vulnerability characteristics that were used to generate the scores.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
 

Video