ELSA-2015-1135

ELSA-2015-1135 - php security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2015-06-23

Description


[5.4.16-36]
- fix more functions accept paths with NUL character #1213407

[5.4.16-35]
- core: fix multipart/form-data request can use excessive
amount of CPU usage CVE-2015-4024
- fix various functions accept paths with NUL character
CVE-2015-4025, CVE-2015-4026, #1213407
- fileinfo: fix denial of service when processing a crafted
file #1213442
- ftp: fix integer overflow leading to heap overflow when
reading FTP file listing CVE-2015-4022
- phar: fix buffer over-read in metadata parsing CVE-2015-2783
- phar: invalid pointer free() in phar_tar_process_metadata()
CVE-2015-3307
- phar: fix buffer overflow in phar_set_inode() CVE-2015-3329
- phar: fix memory corruption in phar_parse_tarfile caused by
empty entry file name CVE-2015-4021
- soap: fix type confusion through unserialize #1222538
- apache2handler: fix pipelined request executed in deinitialized
interpreter under httpd 2.4 CVE-2015-3330

[5.4.16-34]
- fix memory corruption in fileinfo module on big endian
machines #1082624
- fix segfault in pdo_odbc on x86_64 #1159892
- fix segfault in gmp allocator #1154760

[5.4.16-33]
- core: use after free vulnerability in unserialize()
CVE-2014-8142 and CVE-2015-0231
- core: fix use-after-free in unserialize CVE-2015-2787
- core: fix NUL byte injection in file name argument of
move_uploaded_file() CVE-2015-2348
- date: use after free vulnerability in unserialize CVE-2015-0273
- enchant: fix heap buffer overflow in enchant_broker_request_dict
CVE-2014-9705
- exif: free called on unitialized pointer CVE-2015-0232
- fileinfo: fix out of bounds read in mconvert CVE-2014-9652
- gd: fix buffer read overflow in gd_gif_in.c CVE-2014-9709
- phar: use after free in phar_object.c CVE-2015-2301
- soap: fix type confusion through unserialize

[5.4.16-31]
- fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710

[5.4.16-29]
- xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
- core: fix integer overflow in unserialize() CVE-2014-3669
- exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670

[5.4.16-27]
- gd: fix NULL pointer dereference in gdImageCreateFromXpm().
CVE-2014-2497
- gd: fix NUL byte injection in file names. CVE-2014-5120
- fileinfo: fix extensive backtracking in regular expression
(incomplete fix for CVE-2013-7345). CVE-2014-3538
- fileinfo: fix mconvert incorrect handling of truncated
pascal string size. CVE-2014-3478
- fileinfo: fix cdf_read_property_info
(incomplete fix for CVE-2012-1571). CVE-2014-3587
- spl: fix use-after-free in ArrayIterator due to object
change during sorting. CVE-2014-4698
- spl: fix use-after-free in SPL Iterators. CVE-2014-4670
- network: fix segfault in dns_get_record
(incomplete fix for CVE-2014-4049). CVE-2014-3597

[5.4.16-25]
- fix segfault after startup on aarch64 (#1107567)
- compile php with -O3 on ppc64le (#1123499)


Related CVEs


CVE-2014-8142
CVE-2014-9652
CVE-2014-9705
CVE-2014-9709
CVE-2015-0231
CVE-2015-0232
CVE-2015-0273
CVE-2015-2301
CVE-2015-2348
CVE-2015-2783
CVE-2015-2787
CVE-2015-3307
CVE-2015-3329
CVE-2015-3330
CVE-2015-3411
CVE-2015-3412
CVE-2015-4021
CVE-2015-4022
CVE-2015-4024
CVE-2015-4025
CVE-2015-4026
CVE-2015-4147
CVE-2015-4148
CVE-2015-4598
CVE-2015-4599
CVE-2015-4600
CVE-2015-4601
CVE-2015-4602
CVE-2015-4603
CVE-2015-4604
CVE-2015-4605

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (x86_64) php-5.4.16-36.el7_1.src.rpmc4289d6a00ed2f9e41fb9d12a204f1f0ELSA-2020-1112
php-5.4.16-36.el7_1.x86_64.rpm49b6989f72bbb9cb687a88b660873d0aELSA-2020-1112
php-bcmath-5.4.16-36.el7_1.x86_64.rpm748092aa28f802b15f50b6ef4c61c6eeELSA-2020-1112
php-cli-5.4.16-36.el7_1.x86_64.rpmcc4be77dee6dee714ef56cbbbf9e1fbcELSA-2020-1112
php-common-5.4.16-36.el7_1.x86_64.rpm015a6738ec8e7a14b2d40c9ec61e6e22ELSA-2020-1112
php-dba-5.4.16-36.el7_1.x86_64.rpm73277ab2f4ba3246348c992b5414b5a3ELSA-2020-1112
php-devel-5.4.16-36.el7_1.x86_64.rpme409a2aece0c249527df7328938b7d12ELSA-2020-1112
php-embedded-5.4.16-36.el7_1.x86_64.rpmc52fea906be87c9814a0defe43c52759ELSA-2020-1112
php-enchant-5.4.16-36.el7_1.x86_64.rpmcc040060bdffdc282003e8f146869b61ELSA-2020-1112
php-fpm-5.4.16-36.el7_1.x86_64.rpm1f0cf89c865213bc17187072de4e51b7ELSA-2020-1112
php-gd-5.4.16-36.el7_1.x86_64.rpm056ba5423c808d23f7a7ae300f093442ELSA-2020-1112
php-intl-5.4.16-36.el7_1.x86_64.rpm1e70d316743361a00ec13f788f21a5b2ELSA-2020-1112
php-ldap-5.4.16-36.el7_1.x86_64.rpm83e11ec32d932f2350ecebd19cf5bccaELSA-2020-1112
php-mbstring-5.4.16-36.el7_1.x86_64.rpm09a43a96b89e4cd2ef33090ca9d7f9cdELSA-2020-1112
php-mysql-5.4.16-36.el7_1.x86_64.rpma6aa3a74fa882fa40fc3d70eba9a1ad7ELSA-2020-1112
php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm123e40aa15f97992bf54bb23194ac5dbELSA-2020-1112
php-odbc-5.4.16-36.el7_1.x86_64.rpm9b53812bd62ae7ea87e243cd0b8231d4ELSA-2020-1112
php-pdo-5.4.16-36.el7_1.x86_64.rpm6338d3500610c12aabe7bbcebcb4c2d0ELSA-2020-1112
php-pgsql-5.4.16-36.el7_1.x86_64.rpm4bf1806131285597a7a16d4a73a62f59ELSA-2020-1112
php-process-5.4.16-36.el7_1.x86_64.rpmeaca628a5f57462e401c8e47ff772a58ELSA-2020-1112
php-pspell-5.4.16-36.el7_1.x86_64.rpmfeccdcec8921a557d0f69e74fcce4fbbELSA-2020-1112
php-recode-5.4.16-36.el7_1.x86_64.rpm03dcddfe5895698a7578cb745000584cELSA-2020-1112
php-snmp-5.4.16-36.el7_1.x86_64.rpmbba1b222a1ad642c43d5c6300c8e99f8ELSA-2020-1112
php-soap-5.4.16-36.el7_1.x86_64.rpmbddcde3f1bae88d4552f8a126d6c06e9ELSA-2020-1112
php-xml-5.4.16-36.el7_1.x86_64.rpma0eebc71dd944890c1576612390d3df6ELSA-2020-1112
php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm0ec80dfd872e649ee55f7a11c070fd63ELSA-2020-1112



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete