[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Mageia alert MGASA-2015-0258 (php)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0258: Updated php package fixes security vulnerability
Date:  Sun, 5 Jul 2015 19:22:36 +0200
Message-ID:  <20150705172237.143F241D1D@valstar.mageia.org>

MGASA-2015-0258 - Updated php package fixes security vulnerability Publication date: 05 Jul 2015 URL: http://advisories.mageia.org/MGASA-2015-0258.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-4598, CVE-2015-4642, CVE-2015-4643, CVE-2015-4644 Description: Incorrect handling of paths with NULs (CVE-2015-4598). OS command injection vulnerability in escapeshellarg (CVE-2015-4642). Integer overflow in ftp_genlist() resulting in heap overflow (CVE-2015-4643). Segfault in php_pgsql_meta_data (CVE-2015-4644). PHP has been updated to version 5.5.26, which fixes multiple bugs and potential security issues. Please see the upstream ChangeLog for details. References: - https://bugs.mageia.org/show_bug.cgi?id=16115 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 - http://php.net/ChangeLog-5.php#5.5.26 - http://openwall.com/lists/oss-security/2015/06/16/12 - http://openwall.com/lists/oss-security/2015/06/18/6 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 SRPMS: - 4/core/php-5.5.26-1.mga4 - 4/core/php-apc-3.1.15-4.16.mga4


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds