- Issued:
- 2009-05-27
- Updated:
- 2009-09-02
RHBA-2009:1071 - php-pear bug fix update
Synopsis
php-pear bug fix update
Type/Severity
Bug Fix Advisory (none)
Topic
An updated php-pear package that fixes various bugs is now available.
Description
The PHP Extension and Application Repository (PEAR) is a framework and distribution system for reusable PHP components.
This updated php-pear package includes fixes for the following bugs:
-
installing certain PHP components using the /usr/bin/pecl command resulted in failures and error message similar to the following:
Fatal error: Allowed memory size of [amount] bytes exhausted
This updated php-pear package increases the amount of system memory available to the /usr/bin/pecl command with the result that PHP components which previously failed to install due to out-of-memory errors now install cleanly and without error. (BZ#460072)
-
attempting to install a PHP component using PEAR's /usr/bin/pecl command resulted in an error message stating that pecl needed access to the "phpize" command, and therefore could not continue with the install. The phpize utility is used to prepare the build environment for a PHP extension. This issue has been resolved by adding a dependency on the php-devel package to the php-pear package, with the result that installing components with pecl should now complete as expected, and without having to chase any further dependencies. (BZ#482974)
-
the /usr/bin/pear command emitted warnings when the global "error_reporting" PHP configuration variable was set to the value "E_STRICT". The E_STRICT error-reporting level was introduced into PHP and PEAR following the release of PHP 5, and has the aim of ensuring that the package is strictly PHP 5-compatible. With this updated package, /usr/bin/pear no longer emits warnings when the error-reporting level is set to E_STRICT. (BZ#461142)
All users of php-pear are advised to upgrade to this updated package, which resolves these issues.
Solution
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
Updated Packages
- php-pear-1.4.9-6.el5.src.rpm
- php-pear-1.4.9-6.el5.noarch.rpm
Fixes
- This content is not included.BZ - 460072
- This content is not included.BZ - 461142
- This content is not included.BZ - 482974
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.