Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2015-06-23 |
[5.4.16-36]
- fix more functions accept paths with NUL character #1213407
[5.4.16-35]
- core: fix multipart/form-data request can use excessive
amount of CPU usage CVE-2015-4024
- fix various functions accept paths with NUL character
CVE-2015-4025, CVE-2015-4026, #1213407
- fileinfo: fix denial of service when processing a crafted
file #1213442
- ftp: fix integer overflow leading to heap overflow when
reading FTP file listing CVE-2015-4022
- phar: fix buffer over-read in metadata parsing CVE-2015-2783
- phar: invalid pointer free() in phar_tar_process_metadata()
CVE-2015-3307
- phar: fix buffer overflow in phar_set_inode() CVE-2015-3329
- phar: fix memory corruption in phar_parse_tarfile caused by
empty entry file name CVE-2015-4021
- soap: fix type confusion through unserialize #1222538
- apache2handler: fix pipelined request executed in deinitialized
interpreter under httpd 2.4 CVE-2015-3330
[5.4.16-34]
- fix memory corruption in fileinfo module on big endian
machines #1082624
- fix segfault in pdo_odbc on x86_64 #1159892
- fix segfault in gmp allocator #1154760
[5.4.16-33]
- core: use after free vulnerability in unserialize()
CVE-2014-8142 and CVE-2015-0231
- core: fix use-after-free in unserialize CVE-2015-2787
- core: fix NUL byte injection in file name argument of
move_uploaded_file() CVE-2015-2348
- date: use after free vulnerability in unserialize CVE-2015-0273
- enchant: fix heap buffer overflow in enchant_broker_request_dict
CVE-2014-9705
- exif: free called on unitialized pointer CVE-2015-0232
- fileinfo: fix out of bounds read in mconvert CVE-2014-9652
- gd: fix buffer read overflow in gd_gif_in.c CVE-2014-9709
- phar: use after free in phar_object.c CVE-2015-2301
- soap: fix type confusion through unserialize
[5.4.16-31]
- fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
[5.4.16-29]
- xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
- core: fix integer overflow in unserialize() CVE-2014-3669
- exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
[5.4.16-27]
- gd: fix NULL pointer dereference in gdImageCreateFromXpm().
CVE-2014-2497
- gd: fix NUL byte injection in file names. CVE-2014-5120
- fileinfo: fix extensive backtracking in regular expression
(incomplete fix for CVE-2013-7345). CVE-2014-3538
- fileinfo: fix mconvert incorrect handling of truncated
pascal string size. CVE-2014-3478
- fileinfo: fix cdf_read_property_info
(incomplete fix for CVE-2012-1571). CVE-2014-3587
- spl: fix use-after-free in ArrayIterator due to object
change during sorting. CVE-2014-4698
- spl: fix use-after-free in SPL Iterators. CVE-2014-4670
- network: fix segfault in dns_get_record
(incomplete fix for CVE-2014-4049). CVE-2014-3597
[5.4.16-25]
- fix segfault after startup on aarch64 (#1107567)
- compile php with -O3 on ppc64le (#1123499)
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (x86_64) | php-5.4.16-36.el7_1.src.rpm | c4289d6a00ed2f9e41fb9d12a204f1f0 | ELSA-2020-1112 |
php-5.4.16-36.el7_1.x86_64.rpm | 49b6989f72bbb9cb687a88b660873d0a | ELSA-2020-1112 | |
php-bcmath-5.4.16-36.el7_1.x86_64.rpm | 748092aa28f802b15f50b6ef4c61c6ee | ELSA-2020-1112 | |
php-cli-5.4.16-36.el7_1.x86_64.rpm | cc4be77dee6dee714ef56cbbbf9e1fbc | ELSA-2020-1112 | |
php-common-5.4.16-36.el7_1.x86_64.rpm | 015a6738ec8e7a14b2d40c9ec61e6e22 | ELSA-2020-1112 | |
php-dba-5.4.16-36.el7_1.x86_64.rpm | 73277ab2f4ba3246348c992b5414b5a3 | ELSA-2020-1112 | |
php-devel-5.4.16-36.el7_1.x86_64.rpm | e409a2aece0c249527df7328938b7d12 | ELSA-2020-1112 | |
php-embedded-5.4.16-36.el7_1.x86_64.rpm | c52fea906be87c9814a0defe43c52759 | ELSA-2020-1112 | |
php-enchant-5.4.16-36.el7_1.x86_64.rpm | cc040060bdffdc282003e8f146869b61 | ELSA-2020-1112 | |
php-fpm-5.4.16-36.el7_1.x86_64.rpm | 1f0cf89c865213bc17187072de4e51b7 | ELSA-2020-1112 | |
php-gd-5.4.16-36.el7_1.x86_64.rpm | 056ba5423c808d23f7a7ae300f093442 | ELSA-2020-1112 | |
php-intl-5.4.16-36.el7_1.x86_64.rpm | 1e70d316743361a00ec13f788f21a5b2 | ELSA-2020-1112 | |
php-ldap-5.4.16-36.el7_1.x86_64.rpm | 83e11ec32d932f2350ecebd19cf5bcca | ELSA-2020-1112 | |
php-mbstring-5.4.16-36.el7_1.x86_64.rpm | 09a43a96b89e4cd2ef33090ca9d7f9cd | ELSA-2020-1112 | |
php-mysql-5.4.16-36.el7_1.x86_64.rpm | a6aa3a74fa882fa40fc3d70eba9a1ad7 | ELSA-2020-1112 | |
php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm | 123e40aa15f97992bf54bb23194ac5db | ELSA-2020-1112 | |
php-odbc-5.4.16-36.el7_1.x86_64.rpm | 9b53812bd62ae7ea87e243cd0b8231d4 | ELSA-2020-1112 | |
php-pdo-5.4.16-36.el7_1.x86_64.rpm | 6338d3500610c12aabe7bbcebcb4c2d0 | ELSA-2020-1112 | |
php-pgsql-5.4.16-36.el7_1.x86_64.rpm | 4bf1806131285597a7a16d4a73a62f59 | ELSA-2020-1112 | |
php-process-5.4.16-36.el7_1.x86_64.rpm | eaca628a5f57462e401c8e47ff772a58 | ELSA-2020-1112 | |
php-pspell-5.4.16-36.el7_1.x86_64.rpm | feccdcec8921a557d0f69e74fcce4fbb | ELSA-2020-1112 | |
php-recode-5.4.16-36.el7_1.x86_64.rpm | 03dcddfe5895698a7578cb745000584c | ELSA-2020-1112 | |
php-snmp-5.4.16-36.el7_1.x86_64.rpm | bba1b222a1ad642c43d5c6300c8e99f8 | ELSA-2020-1112 | |
php-soap-5.4.16-36.el7_1.x86_64.rpm | bddcde3f1bae88d4552f8a126d6c06e9 | ELSA-2020-1112 | |
php-xml-5.4.16-36.el7_1.x86_64.rpm | a0eebc71dd944890c1576612390d3df6 | ELSA-2020-1112 | |
php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm | 0ec80dfd872e649ee55f7a11c070fd63 | ELSA-2020-1112 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team