Fedora 26: php Security Update

    Date18 Jul 2017
    CategoryFedora
    219
    Posted ByLinuxSecurity Advisories
    **PHP version 7.1.7** (06 Jul 2017) **Core:** * Fixed bug php#74738 (Multiple [PATH=] and [HOST=] sections not properly parsed). (Manuel Mausz) * Fixed bug php#74658 (Undefined constants in array properties result in broken properties). (Laruence) * Fixed misparsing of abstract unix domain socket names. (Sara) * Fixed bug php#74603 (PHP INI Parsing Stack Buffer Overflow Vulnerability).
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2017-b8bb4b86e2
    2017-07-18 19:26:12.549660
    --------------------------------------------------------------------------------
    
    Name        : php
    Product     : Fedora 26
    Version     : 7.1.7
    Release     : 1.fc26
    URL         : http://www.php.net/
    Summary     : PHP scripting language for creating dynamic web sites
    Description :
    PHP is an HTML-embedded scripting language. PHP attempts to make it
    easy for developers to write dynamically generated web pages. PHP also
    offers built-in database integration for several commercial and
    non-commercial database management systems, so writing a
    database-enabled webpage with PHP is fairly simple. The most common
    use of PHP coding is probably as a replacement for CGI scripts.
    
    The php package contains the module (often referred to as mod_php)
    which adds support for the PHP language to Apache HTTP Server.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    **PHP version 7.1.7** (06 Jul 2017)  **Core:**  * Fixed bug php#74738 (Multiple
    [PATH=] and [HOST=] sections not properly parsed). (Manuel Mausz) * Fixed bug
    php#74658 (Undefined constants in array properties result in broken properties).
    (Laruence) * Fixed misparsing of abstract unix domain socket names. (Sara) *
    Fixed bug php#74603 (PHP INI Parsing Stack Buffer Overflow Vulnerability).
    (Stas) * Fixed bug php#74101, bug php#74614 (Unserialize Heap Use-After-Free
    (READ: 1) in zval_get_type). (Nikita) * Fixed bug php#74111 (Heap buffer
    overread (READ: 1) finish_nested_data from unserialize). (Nikita) * Fixed bug
    php#74819 (wddx_deserialize() heap out-of-bound read via php_parse_date()).
    (Derick)  **Date:**  * Fixed bug php#74639 (implement clone for DatePeriod and
    DateInterval). (andrewnester)  **DOM:**  * Fixed bug php#69373 (References to
    deleted XPath query results). (ttoohey)  **Intl:**  * Fixed bug php#73473 (Stack
    Buffer Overflow in msgfmt_parse_message). (libnex) * Fixed bug php#74705 (Wrong
    reflection on Collator::getSortKey and collator_get_sort_key). (Tyson Andre,
    Remi)  **Mbstring:**  * Add oniguruma upstream fix (CVE-2017-9224,
    CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229) (Remi, Mamoru
    TASAKA)  **Opcache:**  * Fixed bug php#74663 (Segfault with
    opcache.memory_protect and validate_timestamp). (Laruence) * Revert
    opcache.enable_cli to default disabled. (Nikita)  **OpenSSL:**  * Fixed bug
    php#74720 (pkcs7_en/decrypt does not work if \x1a is used in content). (Anatol)
    * Fixed bug php#74651 (negative-size-param (-1) in memcpy in
    zif_openssl_seal()). (Stas)  **Reflection:**  * Fixed bug php#74673 (Segfault
    when cast Reflection object to string with undefined constant). (Laruence)
    **SPL:**  * Fixed bug php#74478 (null coalescing operator failing with
    SplFixedArray). (jhdxr)  **FTP:**  * Fixed bug php#74598 (ftp:// wrapper ignores
    context arg). (Sara)  **PHAR:**  * Fixed bug php#74386 (Phar::__construct
    reflection incorrect). (villfa)  **SOAP**  * Fixed bug php#74679 (Incorrect
    conversion array with WSDL_CACHE_MEMORY). (Dmitry)  **Streams:**  * Fixed bug
    php#74556 (stream_socket_get_name() returns '\0'). (Sara)
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade php' at the command line.
    For more information, refer to the dnf documentation available at
    http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"5","type":"x","order":"2","pct":71.43,"resources":[]},{"id":"75","title":"HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.