Mageia alert MGASA-2015-0258 (php)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2015-0258: Updated php package fixes security vulnerability | |
| Date: | Sun, 5 Jul 2015 19:22:36 +0200 | |
| Message-ID: | <20150705172237.143F241D1D@valstar.mageia.org> |
MGASA-2015-0258 - Updated php package fixes security vulnerability Publication date: 05 Jul 2015 URL: http://advisories.mageia.org/MGASA-2015-0258.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-4598, CVE-2015-4642, CVE-2015-4643, CVE-2015-4644 Description: Incorrect handling of paths with NULs (CVE-2015-4598). OS command injection vulnerability in escapeshellarg (CVE-2015-4642). Integer overflow in ftp_genlist() resulting in heap overflow (CVE-2015-4643). Segfault in php_pgsql_meta_data (CVE-2015-4644). PHP has been updated to version 5.5.26, which fixes multiple bugs and potential security issues. Please see the upstream ChangeLog for details. References: - https://bugs.mageia.org/show_bug.cgi?id=16115 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 - http://php.net/ChangeLog-5.php#5.5.26 - http://openwall.com/lists/oss-security/2015/06/16/12 - http://openwall.com/lists/oss-security/2015/06/18/6 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 SRPMS: - 4/core/php-5.5.26-1.mga4 - 4/core/php-apc-3.1.15-4.16.mga4