Fedora 21: php Security Update 2015-6407

    Date 23 Apr 2015
    75
    Posted By LinuxSecurity Advisories
    16 Apr 2015, **PHP 5.6.8** Core: * Fixed bug #66609 (php crashes with __get() and ++ operator in some cases). (Dmitry, Laruence) * Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8 characters). (Tjerk) * Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-6407
    2015-04-18 05:45:03
    --------------------------------------------------------------------------------
    
    Name        : php
    Product     : Fedora 21
    Version     : 5.6.8
    Release     : 1.fc21
    URL         : https://www.php.net/
    Summary     : PHP scripting language for creating dynamic web sites
    Description :
    PHP is an HTML-embedded scripting language. PHP attempts to make it
    easy for developers to write dynamically generated web pages. PHP also
    offers built-in database integration for several commercial and
    non-commercial database management systems, so writing a
    database-enabled webpage with PHP is fairly simple. The most common
    use of PHP coding is probably as a replacement for CGI scripts.
    
    The php package contains the module (often referred to as mod_php)
    which adds support for the PHP language to Apache HTTP Server.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    16 Apr 2015, **PHP 5.6.8**
    
    Core:
    * Fixed bug #66609 (php crashes with __get() and ++ operator in some cases). (Dmitry, Laruence)
    * Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8 characters). (Tjerk)
    * Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
    * Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration options). (Anatol Belski)
    * Additional fix for bug #69152 (Type confusion vulnerability in exception::getTraceAsString). (Stas)
    * Fixed bug #69210 (serialize function return corrupted data when sleep has non-string values). (Juan Basso)
    * Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in __call/... arg passing). (Nikita)
    * Fixed bug #69221 (Segmentation fault when using a generator in combination with an Iterator). (Nikita)
    * Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion vulnerability). (Stas)
    * Fixed bug #69353 (Missing null byte checks for paths in various PHP extensions). (Stas)
    
    Apache2handler:
    * Fixed bug #69218 (potential remote code execution with apache 2.4 apache2handler). (Gerrit Venema)
    
    cURL:
    * Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
    * Fixed bug #68739 (Missing break / control flow). (Laruence)
    * Fixed bug #69316 (Use-after-free in php_curl related to CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)
    
    Date:
    * Fixed bug #69336 (Issues with "last day of "). (Derick Rethans)
    
    Enchant:
    * Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows builds). (Anatol)
    
    Ereg:
    * Fixed bug #68740 (NULL Pointer Dereference). (Laruence)
    
    Fileinfo:
    * Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or segfault). (Anatol Belski)
    
    Filter:
    * Fixed bug #69202: (FILTER_FLAG_STRIP_BACKTICK ignored unless other flags are used). (Jeff Welch)
    * Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff Welch)
    
    OPCache:
    * Fixed bug #69297 (function_exists strange behavior with OPCache on disabled function). (Laruence)
    * Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)
    * Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)
    
    OpenSSL
    * Fixed bugs #68853, #65137 (Buffered crypto stream data breaks IO polling in stream_select() contexts) (Chris Wright)
    * Fixed bug #69197 (openssl_pkcs7_sign handles default value incorrectly) (Daniel Lowrey)
    * Fixed bug #69215 (Crypto servers should send client CA list) (Daniel Lowrey)
    * Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)
    
    Phar:
    * Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar). (Mike)
    * Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
    * Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
    * Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing  ".tar"). (Mike)
    * Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
    * Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode). (Stas)
    
    Postgres:
    * Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)
    
    SPL:
    * Fixed bug #69227 (Use after free in zval_scan caused by spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)
    
    SOAP:
    * Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader (bisected, regression)). (Laruence)
    
    Sqlite3:
    * Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception). (Dan Ackroyd)
    * Fixed bug #69287 (Upgrade bundled libsqlite to 3.8.8.3). (Anatol)
    * Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)
    
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Thu Apr 16 2015 Remi Collet  5.6.8-1
    - Update to 5.6.8
      https://www.php.net/releases/5_6_8.php
    * Fri Mar 20 2015 Remi Collet  5.6.7-1
    - Update to 5.6.7
      https://www.php.net/releases/5_6_7.php
    * Thu Feb 19 2015 Remi Collet  5.6.6-1
    - Update to 5.6.6
      https://www.php.net/releases/5_6_6.php
    * Thu Jan 22 2015 Remi Collet  5.6.5-1
    - Update to 5.6.5
      https://www.php.net/releases/5_6_5.php
    - FPM: enable ACL support for Unix Domain Socket
    * Wed Dec 17 2014 Remi Collet  5.6.4-2
    - Update to 5.6.4 (real)
      https://www.php.net/releases/5_6_4.php
    - php-xmlrpc requires php-xml
    * Wed Dec 10 2014 Remi Collet  5.6.4-1
    - Update to 5.6.4
      https://www.php.net/releases/5_6_4.php
    * Fri Nov 28 2014 Remi Collet  5.6.4-0.1.RC1
    - php 5.6.4RC1
    * Mon Nov 17 2014 Remi Collet  5.6.3-4
    - FPM: add upstream patch for https://bugs.php.net/68428
      listen.allowed_clients is IPv4 only
    * Mon Nov 17 2014 Remi Collet  5.6.3-3
    - sync php-fpm configuration with upstream
    - refresh upstream patch for 68421
    * Sun Nov 16 2014 Remi Collet  5.6.3-2
    - FPM: add upstream patch for https://bugs.php.net/68421
      access.format=R doesn't log ipv6 address
    - FPM: add upstream patch for https://bugs.php.net/68420
      listen=9000 listens to ipv6 localhost instead of all addresses
    - FPM: add upstream patch for https://bugs.php.net/68423
      will no longer load all pools
    * Thu Nov 13 2014 Remi Collet  5.6.3-1
    - Update to PHP 5.6.3
      https://php.net/releases/5_6_3.php
    * Fri Oct 31 2014 Remi Collet  5.6.3-0.2.RC1
    - php 5.6.3RC1 (refreshed, phpdbg changes reverted)
    - new version of systzdata patch, fix case sensitivity
    - ignore Factory in date tests
    * Wed Oct 29 2014 Remi Collet  5.6.3-0.1.RC1
    - php 5.6.3RC1
    - disable opcache.fast_shutdown in default config
    - enable phpdbg_webhelper new extension (in php-dbg)
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1185900 - CVE-2015-1351 php: use after free in opcache extension
            https://bugzilla.redhat.com/show_bug.cgi?id=1185900
      [ 2 ] Bug #1213407 - php: missing null byte checks for paths in various PHP extensions
            https://bugzilla.redhat.com/show_bug.cgi?id=1213407
      [ 3 ] Bug #1213411 - php: use-after-free vulnerability in php_curl related to CURLOPT_FILE/_INFILE/_WRITEHEADER
            https://bugzilla.redhat.com/show_bug.cgi?id=1213411
      [ 4 ] Bug #1185904 - CVE-2015-1352 php: NULL pointer dereference in pgsql extension
            https://bugzilla.redhat.com/show_bug.cgi?id=1185904
      [ 5 ] Bug #1213416 - php: NULL pointer dereference at ext/ereg/regex/regcomp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1213416
      [ 6 ] Bug #1213442 - php: denial of service when processing a crafted file with Fileinfo
            https://bugzilla.redhat.com/show_bug.cgi?id=1213442
      [ 7 ] Bug #1213446 - CVE-2015-2783 php: Buffer Over-read in unserialize when parsing Phar
            https://bugzilla.redhat.com/show_bug.cgi?id=1213446
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update php' at the command line.
    For more information, refer to "Managing Software with yum",
    available at https://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"19","type":"x","order":"1","pct":95,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":5,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.