Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in PHP
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in PHP
ID: FEDORA-2015-6195
Distribution: Fedora
Plattformen: Fedora 22
Datum: Do, 23. April 2015, 07:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329

Originalnachricht

Name        : php
Product : Fedora 22
Version : 5.6.8
Release : 1.fc22
URL : http://www.php.net/
Summary : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module (often referred to as mod_php)
which adds support for the PHP language to Apache HTTP Server.

-------------------------------------------------------------------------------
-
Update Information:

16 Apr 2015, **PHP 5.6.8**

Core:
* Fixed bug #66609 (php crashes with __get() and ++ operator in some cases).
(Dmitry, Laruence)
* Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8
characters). (Tjerk)
* Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
* Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration
options). (Anatol Belski)
* Additional fix for bug #69152 (Type confusion vulnerability in
exception::getTraceAsString). (Stas)
* Fixed bug #69210 (serialize function return corrupted data when sleep has
non-string values). (Juan Basso)
* Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in
__call/... arg passing). (Nikita)
* Fixed bug #69221 (Segmentation fault when using a generator in combination
with an Iterator). (Nikita)
* Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion
vulnerability). (Stas)
* Fixed bug #69353 (Missing null byte checks for paths in various PHP
extensions). (Stas)

Apache2handler:
* Fixed bug #69218 (potential remote code execution with apache 2.4
apache2handler). (Gerrit Venema)

cURL:
* Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
* Fixed bug #68739 (Missing break / control flow). (Laruence)
* Fixed bug #69316 (Use-after-free in php_curl related to
CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)

Date:
* Fixed bug #69336 (Issues with "last day of <monthname>").
(Derick Rethans)

Enchant:
* Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows
builds). (Anatol)

Ereg:
* Fixed bug #68740 (NULL Pointer Dereference). (Laruence)

Fileinfo:
* Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or
segfault). (Anatol Belski)

Filter:
* Fixed bug #69202: (FILTER_FLAG_STRIP_BACKTICK ignored unless other flags are
used). (Jeff Welch)
* Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff
Welch)

OPCache:
* Fixed bug #69297 (function_exists strange behavior with OPCache on disabled
function). (Laruence)
* Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)
* Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)

OpenSSL
* Fixed bugs #68853, #65137 (Buffered crypto stream data breaks IO polling in
stream_select() contexts) (Chris Wright)
* Fixed bug #69197 (openssl_pkcs7_sign handles default value incorrectly)
(Daniel Lowrey)
* Fixed bug #69215 (Crypto servers should send client CA list) (Daniel Lowrey)
* Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)

Phar:
* Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar).
(Mike)
* Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
* Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
* Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing
".tar"). (Mike)
* Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
* Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
phar_set_inode). (Stas)

Postgres:
* Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)

SPL:
* Fixed bug #69227 (Use after free in zval_scan caused by
spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)

SOAP:
* Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader
(bisected, regression)). (Laruence)

Sqlite3:
* Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception).
(Dan Ackroyd)
* Fixed bug #69287 (Upgrade bundled libsqlite to 3.8.8.3). (Anatol)
* Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)

-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1185900 - CVE-2015-1351 php: use after free in opcache extension
https://bugzilla.redhat.com/show_bug.cgi?id=1185900
[ 2 ] Bug #1185904 - CVE-2015-1352 php: NULL pointer dereference in pgsql
extension
https://bugzilla.redhat.com/show_bug.cgi?id=1185904
[ 3 ] Bug #1213407 - php: missing null byte checks for paths in various PHP
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1213407
[ 4 ] Bug #1213411 - php: use-after-free vulnerability in php_curl related to
CURLOPT_FILE/_INFILE/_WRITEHEADER
https://bugzilla.redhat.com/show_bug.cgi?id=1213411
[ 5 ] Bug #1213416 - php: NULL pointer dereference at
ext/ereg/regex/regcomp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1213416
[ 6 ] Bug #1213442 - php: denial of service when processing a crafted file
with Fileinfo
https://bugzilla.redhat.com/show_bug.cgi?id=1213442
[ 7 ] Bug #1213446 - CVE-2015-2783 php: Buffer Over-read in unserialize when
parsing Phar
https://bugzilla.redhat.com/show_bug.cgi?id=1213446
[ 8 ] Bug #1213449 - CVE-2015-3329 php: Buffer Over flow when parsing
tar/zip/phar in phar_set_inode()
https://bugzilla.redhat.com/show_bug.cgi?id=1213449
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung