drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in PHP
Name: |
Mehrere Probleme in PHP |
|
ID: |
USN-2535-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10 |
|
Datum: |
Mi, 18. März 2015, 18:46 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301 |
|
Applikationen: |
PHP |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1557067457351239944== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="lKbLK817gC0qNbGWfd2eTT2FPAFLwrRjH"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --lKbLK817gC0qNbGWfd2eTT2FPAFLwrRjH Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2535-1 March 18, 2015
php5 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description: - php5: HTML-embedded scripting language interpreter
Details:
Thomas Jarosch discovered that PHP incorrectly limited recursion in the fileinfo extension. A remote attacker could possibly use this issue to cause PHP to consume resources or crash, resulting in a denial of service. (CVE-2014-8117)
S. Paraschoudis discovered that PHP incorrectly handled memory in the enchant binding. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-9705)
Taoguang Chen discovered that PHP incorrectly handled unserializing objects. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-0273)
It was discovered that PHP incorrectly handled memory in the phar extension. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-2301)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: libapache2-mod-php5 5.5.12+dfsg-2ubuntu4.3 php5-cgi 5.5.12+dfsg-2ubuntu4.3 php5-cli 5.5.12+dfsg-2ubuntu4.3 php5-enchant 5.5.12+dfsg-2ubuntu4.3 php5-fpm 5.5.12+dfsg-2ubuntu4.3
Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.7 php5-cgi 5.5.9+dfsg-1ubuntu4.7 php5-cli 5.5.9+dfsg-1ubuntu4.7 php5-enchant 5.5.9+dfsg-1ubuntu4.7 php5-fpm 5.5.9+dfsg-1ubuntu4.7
Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.17 php5-cgi 5.3.10-1ubuntu3.17 php5-cli 5.3.10-1ubuntu3.17 php5-enchant 5.3.10-1ubuntu3.17 php5-fpm 5.3.10-1ubuntu3.17
Ubuntu 10.04 LTS: libapache2-mod-php5 5.3.2-1ubuntu4.29 php5-cgi 5.3.2-1ubuntu4.29 php5-cli 5.3.2-1ubuntu4.29 php5-enchant 5.3.2-1ubuntu4.29
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2535-1 CVE-2014-8117, CVE-2014-9705, CVE-2015-0273, CVE-2015-2301
Package Information: https://launchpad.net/ubuntu/+source/php5/5.5.12+dfsg-2ubuntu4.3 https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.7 https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.17 https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.29
--lKbLK817gC0qNbGWfd2eTT2FPAFLwrRjH Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVCX43AAoJEGVp2FWnRL6TF2UP/iTFdiDwbJXNTLAq6hlQaFGU nC/WZFxQQBrKESaoaK2D7Va9ggDyTxAERUTbRaO+p7l9Sc3S72QENqXvsuF6qapX 0D1Z/cfWklmifWN9Q1PZ/dIlcIooJkdPtprn2GPeEK/vZnkSTrbu9A2mOlFVy+Yt 3aC2IuDPfoA3CiTpXG/9J1R+bYw4foCvS1XVAqJK2+qHC3JFVar+mZsbkPE9c9l1 G2Eu8G/KRb2y3xE+nhkKi+OVSyimg2mkVBrzyizBh7jAjI5VYHAlq4U9uQnGueft hIgCbOZCnhTCfQKwAe+nu8dvMp7hBVuKSsEFcpvciji3kxh1UfU11bnN33Fr2TmH xTIzcijaPULeHtwSmTslyjMSNAjiBK11y/3CIJ7R5LxMKK4NtMP40ZgVTMCpeBcv LFM9fIDwyR/9HSQhzvqbDDY4PBnPTD1jAg8Mj8ibuxmS7zRws9nPYL6hPWOU+GOe L8N9S4WQLOL16D/DiIacaLZNo7XbbrvAqYTTf00MfBQ443PNY9Ec8zeyZrm5G3Yy YJgF6Ek9iEqe/f/zpusI+Vu9m7ECiqwo0bsMitIc7yjmpua4OyDwrEeUQ56Tv+3s CSX0rfQ8LaZulzTs/FuIOnXn9F+uxnlcs83k3muu6rg5p0bTcFjyZJW9JJ4ncTBS K8ecQP/P+3fWi9j3jILx =uSM1 -----END PGP SIGNATURE-----
--lKbLK817gC0qNbGWfd2eTT2FPAFLwrRjH--
--===============1557067457351239944== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1557067457351239944==--
|
|
|
|